Corporate Partners

Top IT Security Bloggers

TrendLabs - Malware Blog
  • TorrentLocker Run Hits Italian Targets

    TrendLabs - Malware Blog
    We recently observed a new ransomware variant, TorrentLocker, that was targeted at nearly 4,000 Italian organizations and enterprises. TorrentLocker is similar to an earlier ransomware family (CryptoLocker), and also encrypts various files and forces users to pay a sum of money. TorrentLocker uses the TOR anonymity network to hide its network traffic, which may have been […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroTorrentLocker Run Hits Italian Targets
  • Targeted Attacks: Stealing Information Through Google Drive

    TrendLabs - Malware Blog
    Using cloud-based sharing sites is not a new routine for bad guys. Aside from providing free storage for their malicious files, these legitimate sites are used to evade security vendors and researchers. We have seen malware that have taken advantage of these sites, such as DropBox, Sendspace, and Evernote. We can now include Google Drive to […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroTargeted Attacks: Stealing Information Through Google Drive
  • Data Privacy for Businesses: A Part of Doing Business

    TrendLabs - Malware Blog
    Recent data breaches in big enterprises like large banks and retail chains make one thing clear: data privacy and protection is a concern for all organizations, not just large ones. If  large enterprises with plenty of available resources can be affected by attacks and lose their data, smaller organizations without these resources are at risk as well. […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroData Privacy for Businesses: A Part of Doing Business
  • Smart Lock Devices: Security Risks and Opportunities

    TrendLabs - Malware Blog
    Security is one of the top concerns when consumers consider buying smart devices. With cybercrime making the headlines every day, one has to think: is this smart device vulnerable to cyber attacks? Are these technologies secure enough for us to rely on them in our everyday lives? A good example of a technology that we need […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroSmart Lock Devices: Security Risks and Opportunities
  • An Analysis of A Windows Kernel-Mode Vulnerability (CVE-2014-4113)

    TrendLabs - Malware Blog
    Three zero-day vulnerabilities - CVE-2014-4114, CVE-2014-4148, and CVE-2014-4113 - were reported last week and patched by Microsoft in their October 2014 Patch Tuesday. CVE-2014-4114, also known as the Sandworm vulnerability, can enable attackers to easily craft malware payloads when exploited. This particular vulnerability has been linked to targeted attacks against European sectors and industries. In addition, our researchers found that […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroAn Analysis of A Windows Kernel-Mode Vulnerability (CVE-2014-4113)
  • Sandworm to Blacken: The SCADA Connection

    TrendLabs - Malware Blog
    On October 14th, a report was publicly released regarding the Sandworm team.  After beginning an investigation into the affiliated malware samples and domains, we quickly came to realization that this group is very likely targeting SCADA-centric victims who are using GE Intelligent Platform’s CIMPLICITY HMI solution suite.   We have observed this team utilizing .cim and .bcl […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroSandworm to Blacken: The SCADA Connection
  • Old Adobe Vulnerability Used in Dyreza Attack, Targets Bitcoin Sites

    TrendLabs - Malware Blog
    Cybercriminals and threat actors often use tried-and-tested vulnerabilities in order to infect user systems and consequently, penetrate an enterprise network. This highlights the importance of patching systems and keeping software and applications up-to-date. We recently spotted DYREZA malware leveraging an old vulnerability found existing in Adobe Reader and Acrobat and covered under CVE-2013-2729. Accordingly, once […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroOld Adobe Vulnerability Used in Dyreza Attack, Targets Bitcoin Sites
  • CUTWAIL Spambot Leads to UPATRE-DYRE Infection

    TrendLabs - Malware Blog
    A new spam attack disguised as invoice message notifications was recently seen spreading the UPATRE malware, that ultimately downloads its final  payload- a BANKER malware related to the DYREZA/DYRE banking malware. Background In early October we observed a surge of spammed messages sent by the botnet CUTWAIL/PUSHDO, totaling to more than 18,000 messages seen in a single day. CUTWAIL/PUSHDO has been in […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroCUTWAIL Spambot Leads to UPATRE-DYRE Infection
  • Soundsquatting Unraveled: Homophone-based Domain Squatting

    TrendLabs - Malware Blog
    The Domain Name System (DNS) plays a vital role in the operation of the Internet. Over the years, it has been a primary target for malicious users looking for vulnerabilities in its protocol and infrastructure. Some examples include cache poisoning attacks, vulnerable DNS server implementations, and bogus user interactions. Taking advantage of users’ spelling mistakes […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroSoundsquatting Unraveled: Homophone-based Domain Squatting
  • POODLE Vulnerability Puts Online Transactions At Risk

    TrendLabs - Malware Blog
    Earlier today, Google researchers Bodo Möller, Thai Duong, and Krzysztof Kotowicz released a paper discussing a serious bug in SSL 3.0 that allows attackers to conduct man-in-the-middle attacks and decrypt the traffic between Web servers and end users. For example, if you’re shopping online with your credit card, you may think that your information is secure […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroPOODLE Vulnerability Puts Online Transactions At Risk

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place