Corporate Partners

Top IT Security Bloggers

TrendLabs - Malware Blog
  • An Analysis of A Windows Kernel-Mode Vulnerability (CVE-2014-4113)

    TrendLabs - Malware Blog
    Three zero-day vulnerabilities - CVE-2014-4114, CVE-2014-4148, and CVE-2014-4113 - were reported last week and patched by Microsoft in their October 2014 Patch Tuesday. CVE-2014-4114, also known as the Sandworm vulnerability, can enable attackers to easily craft malware payloads when exploited. This particular vulnerability has been linked to targeted attacks against European sectors and industries. In addition, our researchers found that […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroAn Analysis of A Windows Kernel-Mode Vulnerability (CVE-2014-4113)
  • Sandworm to Blacken: The SCADA Connection

    TrendLabs - Malware Blog
    On October 14th, a report was publicly released regarding the Sandworm team.  After beginning an investigation into the affiliated malware samples and domains, we quickly came to realization that this group is very likely targeting SCADA-centric victims who are using GE Intelligent Platform’s CIMPLICITY HMI solution suite.   We have observed this team utilizing .cim and .bcl […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroSandworm to Blacken: The SCADA Connection
  • Old Adobe Vulnerability Used in Dyreza Attack, Targets Bitcoin Sites

    TrendLabs - Malware Blog
    Cybercriminals and threat actors often use tried-and-tested vulnerabilities in order to infect user systems and consequently, penetrate an enterprise network. This highlights the importance of patching systems and keeping software and applications up-to-date. We recently spotted DYREZA malware leveraging an old vulnerability found existing in Adobe Reader and Acrobat and covered under CVE-2013-2729. Accordingly, once […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroOld Adobe Vulnerability Used in Dyreza Attack, Targets Bitcoin Sites
  • CUTWAIL Spambot Leads to UPATRE-DYRE Infection

    TrendLabs - Malware Blog
    A new spam attack disguised as invoice message notifications was recently seen spreading the UPATRE malware, that ultimately downloads its final  payload- a BANKER malware related to the DYREZA/DYRE banking malware. Background In early October we observed a surge of spammed messages sent by the botnet CUTWAIL/PUSHDO, totaling to more than 18,000 messages seen in a single day. CUTWAIL/PUSHDO has been in […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroCUTWAIL Spambot Leads to UPATRE-DYRE Infection
  • Soundsquatting Unraveled: Homophone-based Domain Squatting

    TrendLabs - Malware Blog
    The Domain Name System (DNS) plays a vital role in the operation of the Internet. Over the years, it has been a primary target for malicious users looking for vulnerabilities in its protocol and infrastructure. Some examples include cache poisoning attacks, vulnerable DNS server implementations, and bogus user interactions. Taking advantage of users’ spelling mistakes […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroSoundsquatting Unraveled: Homophone-based Domain Squatting
  • POODLE Vulnerability Puts Online Transactions At Risk

    TrendLabs - Malware Blog
    Earlier today, Google researchers Bodo Möller, Thai Duong, and Krzysztof Kotowicz released a paper discussing a serious bug in SSL 3.0 that allows attackers to conduct man-in-the-middle attacks and decrypt the traffic between Web servers and end users. For example, if you’re shopping online with your credit card, you may think that your information is secure […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroPOODLE Vulnerability Puts Online Transactions At Risk
  • Targeted Attack Protection via Network Topology Alteration

    TrendLabs - Malware Blog
    When it comes to targeted attacks, attackers are not omniscient. They need to gather information in the early stages to know the target they may gather information from various sources of intelligence, like Google, Whois, Twitter, and Facebook. They may gather data such as email addresses, IP ranges, and contact lists. These will then be used as […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroTargeted Attack Protection via Network Topology Alteration
  • Is Your Data Safe In The Internet of Everything?

    TrendLabs - Malware Blog
    I prefer using the phrase “Internet of Everything” when discussing what most people call the Internet of Things because in many ways, the latter term isn’t enough. What makes the Internet of Everything so powerful is the data about you and me that these devices can gather. Consider how these devices actually work. They almost […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroIs Your Data Safe In The Internet of Everything?
  • October 2014 Patch Tuesday Fixes Sandworm Vulnerability

    TrendLabs - Malware Blog
    Three out of nine security bulletins in today’s Microsoft Patch Tuesday are marked as Critical while the rest are tagged as Important The patches address vulnerabilities found in Internet Explorer, and Microsoft .NET Framework, including the zero-day exploit affecting Microsoft Windows. MS14-060 discusses the Sandworm zero-day vulnerability which was discussed earlier in the week. Based on our analysis, attackers may […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroOctober 2014 Patch Tuesday Fixes Sandworm Vulnerability
  • Investigating Twitter Abuse, Part 3

    TrendLabs - Malware Blog
    In the two previous parts of this series of blog posts, we discussed the kinds of threats that we’re seeing on Twitter, as well as the scope and scale of these threats. In this part, we will discuss their motivations, and what end users can do. The first question is: why do cybercriminals bother doing […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroInvestigating Twitter Abuse, Part 3

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place