Corporate Partners

Top IT Security Bloggers

TrendLabs - Malware Blog
  • New Mobile OS Versions Improve Security

    TrendLabs - Malware Blog
    The competition between mobile OSes is heating up, with Apple’s iOS 8 and Google’s Android Lollipop in tight competition, as the public discovers their features and what these OSs can do for them. There are notable changes and significant improvements in these releases, particularly in their default settings. Encryption by default seems to be the primary […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroNew Mobile OS Versions Improve Security
  • New CVE-2014-4114 Attacks Seen One Week After Fix

    TrendLabs - Malware Blog
    Despite the availability of fixes related to the Sandworm vulnerability (CVE-2014-4114), we are still seeing new attacks related to this flaw. These attacks contain a new routine that could prevent detection. A New Evasion Technique In our analysis of the vulnerability, we noted this detail: “…[T]he vulnerability exists in PACKAGER.DLL, which is a part of […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroNew CVE-2014-4114 Attacks Seen One Week After Fix
  • Operation Pawn Storm: The Red in SEDNIT

    TrendLabs - Malware Blog
    Pawn Storm is an active economic and political cyber-espionage operation targeting a wide range of entities, mostly those related to the military, governments, and media. Specific targets include: Military agencies, embassies, and defense contractors in the US and its allies Opposition politicians and dissidents of the Russian government International media The national security department of a US […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroOperation Pawn Storm: The Red in SEDNIT
  • Microsoft Windows Hit By New Zero-Day Attack

    TrendLabs - Malware Blog
    Microsoft has disclosed that a new zero-day vulnerability is present in Windows, and is exploited via Microsoft Office files. According to Microsoft Security Advistory 3010060, the vulnerability is present in all supported versions of Windows except Windows Server 2003. The vulnerability (designated as CVE-2014-6352) is triggered by an attacker sending a specially crafted Microsoft Office file […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroMicrosoft Windows Hit By New Zero-Day Attack
  • TorrentLocker Run Hits Italian Targets

    TrendLabs - Malware Blog
    We recently observed a new ransomware variant, TorrentLocker, that was targeted at nearly 4,000 Italian organizations and enterprises. TorrentLocker is similar to an earlier ransomware family (CryptoLocker), and also encrypts various files and forces users to pay a sum of money. TorrentLocker uses the TOR anonymity network to hide its network traffic, which may have been […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroTorrentLocker Run Hits Italian Targets
  • Targeted Attacks: Stealing Information Through Google Drive

    TrendLabs - Malware Blog
    Using cloud-based sharing sites is not a new routine for bad guys. Aside from providing free storage for their malicious files, these legitimate sites are used to evade security vendors and researchers. We have seen malware that have taken advantage of these sites, such as DropBox, Sendspace, and Evernote. We can now include Google Drive to […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroTargeted Attacks: Stealing Information Through Google Drive
  • Data Privacy for Businesses: A Part of Doing Business

    TrendLabs - Malware Blog
    Recent data breaches in big enterprises like large banks and retail chains make one thing clear: data privacy and protection is a concern for all organizations, not just large ones. If  large enterprises with plenty of available resources can be affected by attacks and lose their data, smaller organizations without these resources are at risk as well. […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroData Privacy for Businesses: A Part of Doing Business
  • Smart Lock Devices: Security Risks and Opportunities

    TrendLabs - Malware Blog
    Security is one of the top concerns when consumers consider buying smart devices. With cybercrime making the headlines every day, one has to think: is this smart device vulnerable to cyber attacks? Are these technologies secure enough for us to rely on them in our everyday lives? A good example of a technology that we need […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroSmart Lock Devices: Security Risks and Opportunities
  • An Analysis of A Windows Kernel-Mode Vulnerability (CVE-2014-4113)

    TrendLabs - Malware Blog
    Three zero-day vulnerabilities - CVE-2014-4114, CVE-2014-4148, and CVE-2014-4113 - were reported last week and patched by Microsoft in their October 2014 Patch Tuesday. CVE-2014-4114, also known as the Sandworm vulnerability, can enable attackers to easily craft malware payloads when exploited. This particular vulnerability has been linked to targeted attacks against European sectors and industries. In addition, our researchers found that […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroAn Analysis of A Windows Kernel-Mode Vulnerability (CVE-2014-4113)
  • Sandworm to Blacken: The SCADA Connection

    TrendLabs - Malware Blog
    On October 14th, a report was publicly released regarding the Sandworm team.  After beginning an investigation into the affiliated malware samples and domains, we quickly came to realization that this group is very likely targeting SCADA-centric victims who are using GE Intelligent Platform’s CIMPLICITY HMI solution suite.   We have observed this team utilizing .cim and .bcl […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroSandworm to Blacken: The SCADA Connection

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place