Corporate Partners

Top IT Security Bloggers

TrendLabs - Malware Blog
  • Lordfenix: 20-year-old Brazilian Makes Profit Off Banking Malware

    TrendLabs - Malware Blog
    A 20-year-old college student whose underground username is Lordfenix has become one of Brazil’s top banking malware creators. Lordfenix developed his underground reputation by creating more than a hundred online banking Trojans, each valued at over US$300. Lordfenix is the latest in a string of young and notorious solo cybercriminals we’re seeing today. Who is […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroLordfenix: 20-year-old Brazilian Makes Profit Off Banking Malware
  • MERS News Used in Targeted Attack against Japanese Media Company

    TrendLabs - Malware Blog
    Attackers used news of the Middle East Respiratory Syndrome (MERS) outbreak as hook in a spear-phishing email sent to an employee of a popular Japanese mass media company. Using a free account from Yahoo! Mail to easily pass through anti-spam filters, the attackers copied publicly available information from the Internet to lure the recipient to […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroMERS News Used in Targeted Attack against Japanese Media Company
  • The State of the ESILE/Lotus Blossom Campaign

    TrendLabs - Malware Blog
    The Esile targeted attack campaign targeting various countries in the Southeast Asian region has been discussed in the media recently. This campaign – which was referred to by other researchers as Lotus Blossom – is believed to be the work of a nation-state actor due to the nature of the stolen information, which is more valuable to countries than either […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroThe State of the ESILE/Lotus Blossom Campaign
  • Trend Micro Discovers Android Vulnerability that Can Lead to Exposure of Device Memory Content

    TrendLabs - Malware Blog
    We have discovered a vulnerability in the integrated Android debugger Debuggerd that can be used to expose the contents of the device’s memory in devices running Ice Cream Sandwich to Lollipop. A specially crafted ELF (Executable and Linkable Format) file can crash the debugger and expose the memory content via tombstone files and corresponding logd log files. This […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroTrend Micro Discovers Android Vulnerability that Can Lead to Exposure of Device Memory Content
  • Change of Supplier Fraud: How Cybercriminals Earned Millions Using a $35 Malware

    TrendLabs - Malware Blog
    In our recent research, Piercing the HawkEye, we uncovered various ways cybercriminals were able to exploit information they gathered from monitoring victims’ mailboxes in order to steal money from businesses. One of the examples we shared, the “change of supplier” fraud, was one of the most notable, as this type of scheme has been known […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroChange of Supplier Fraud: How Cybercriminals Earned Millions Using a $35 Malware
  • US Healthcare Organizations Most Affected by Stegoloader Trojan

    TrendLabs - Malware Blog
    Most victims of the Stegoloader Trojan, which has recently been making its rounds in the news, are observed to come from healthcare organizations in North America.  The malware known as TROJ_GATAK has been active since 2012 and uses steganography techniques to hide components in .PNG files. Looking at recent victims of the Stegoloader malware, we […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroUS Healthcare Organizations Most Affected by Stegoloader Trojan
  • New Adobe Zero-Day Shares Same Root Cause as Older Flaws

    TrendLabs - Malware Blog
    Earlier we talked about the out-of-band update for Flash Player that was released by Adobe (identified as APSB15-14) that was released to fix CVE-2015-3113. This update raised the Flash Player version to 18.0.0.194. Our analysis of the current flaw reveals that the root cause of CVE-2015-3113 is similar to CVE-2015-3043. Both cause a buffer overflow within the Flash Player code. […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroNew Adobe Zero-Day Shares Same Root Cause as Older Flaws
  • Adobe Issues Emergency Patch for Flash Zero-Day

    TrendLabs - Malware Blog
    Adobe has just released an update to address a vulnerability found in its Flash Player browser plug-in. In its security advisory (APSB15-14), Adobe notes that this vulnerability “is being actively exploited in the wild via limited, targeted attacks. Systems running Internet Explorer for Windows 7 and below, as well as Firefox on Windows XP, are […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroAdobe Issues Emergency Patch for Flash Zero-Day
  • Digging Into the Deep Web

    TrendLabs - Malware Blog
    Mention the “Deep Web” and most people will instantly associate it with the part of the Internet used for nefarious and illegal activities. For others, it is this inaccessible side of the Web, the one that requires a lot of technical skill and know-how to reach. Although these assumptions are somewhat correct, they only cover […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroDigging Into the Deep Web
  • The Samsung SwiftKey Vulnerability – What You Need To Know, And How To Protect Yourself

    TrendLabs - Malware Blog
    Recently, researchers announced that a vulnerability in Samsung Android devices had been found which allowed attackers to run malicious code on vulnerable devices if they became the targets of a man-in-the-middle attack. In this post we will explain how this vulnerability works, and what can users do to protect themselves. The Vulnerability The stock Android […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroThe Samsung SwiftKey Vulnerability – What You Need To Know, And How To Protect Yourself

Market Place