Corporate Partners

Top IT Security Bloggers

TrendLabs - Malware Blog
  • An In-Depth Look Into Malicious Browser Extensions

    TrendLabs - Malware Blog
    Malicious browser extensions bring about security risks as these often lead to system infection and unwanted spamming on Facebook. Based on our data, these attacks have notably affected users in Brazil. We have previously reported that cybercriminals are putting malicious browsers in the official Chrome Web store. We also came across malware that bypasses a Google security […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroAn In-Depth Look Into Malicious Browser Extensions
  • Flash Pack Exploit Leads to New Family of Malware

    TrendLabs - Malware Blog
    We have been continuously monitoring the FlashPack exploit, especially with the recent attack which affected Japanese users. We recently looked at our Smart Protection Network feedback and found in a new development that majority of the infected systems of FlashPack exploit came from the U.S. Figure 1. Top infected countries for the FlashPack exploit (based on feedback […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroFlash Pack Exploit Leads to New Family of Malware
  • Phishers Improve Scheme With Spoofed Google Drive Site

    TrendLabs - Malware Blog
    Cybercriminals and attackers are leveraging Google Drive site and brand to go under the radar and avoid detection. Just last week, a targeted attack uses Google Drive as a means into getting information from its victims. This time, phishers are using a modified version of the legitimate Google Drive login page to steal email credentials. This attack […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroPhishers Improve Scheme With Spoofed Google Drive Site
  • Fighting Cybercrime Across Borders: Why Law Enforcement Collaboration Matters

    TrendLabs - Malware Blog
    We’ve frequently talked about how important it is for law enforcement and security companies to work together to stop cybercrime. One particular reason to do so is because of the nature of cybercrime: simply put, it has no borders. Perhaps more than any other type of crime, cybercrime respects no borders. A cybercriminal in Russia […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroFighting Cybercrime Across Borders: Why Law Enforcement Collaboration Matters
  • Old versus New: Vulnerabilities in Targeted Attacks

    TrendLabs - Malware Blog
    Much has been reported about the recent discovery of a cyber-espionage campaign that was launched by a group known as the “Sandworm Team.” At the very heart of this incident—a zero-day vulnerability affecting all supported versions of Microsoft Windows and Windows Server 2008 and 2012. In our analysis, the vulnerability may allow attackers to execute […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroOld versus New: Vulnerabilities in Targeted Attacks
  • Operation Pawn Storm: Putting Outlook Web Access Users at Risk

    TrendLabs - Malware Blog
    In our recently released report, Operation Pawn Storm, we talked about an operation that involved three attack scenarios. For this post, we will talk about the third scenario: phishing emails that redirect victims to fake Outlook Web Access login pages. What’s most notable about this is that it is simple, effective, and can be easily replicated. Through one […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroOperation Pawn Storm: Putting Outlook Web Access Users at Risk
  • New Mobile OS Versions Improve Security

    TrendLabs - Malware Blog
    The competition between mobile OSes is heating up, with Apple’s iOS 8 and Google’s Android Lollipop in tight competition, as the public discovers their features and what these OSs can do for them. There are notable changes and significant improvements in these releases, particularly in their default settings. Encryption by default seems to be the primary […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroNew Mobile OS Versions Improve Security
  • New CVE-2014-4114 Attacks Seen One Week After Fix

    TrendLabs - Malware Blog
    Despite the availability of fixes related to the Sandworm vulnerability (CVE-2014-4114), we are still seeing new attacks related to this flaw. These attacks contain a new routine that could prevent detection. A New Evasion Technique In our analysis of the vulnerability, we noted this detail: “…[T]he vulnerability exists in PACKAGER.DLL, which is a part of […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroNew CVE-2014-4114 Attacks Seen One Week After Fix
  • Operation Pawn Storm: The Red in SEDNIT

    TrendLabs - Malware Blog
    Pawn Storm is an active economic and political cyber-espionage operation targeting a wide range of entities, mostly those related to the military, governments, and media. Specific targets include: Military agencies, embassies, and defense contractors in the US and its allies Opposition politicians and dissidents of the Russian government International media The national security department of a US […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroOperation Pawn Storm: The Red in SEDNIT
  • Microsoft Windows Hit By New Zero-Day Attack

    TrendLabs - Malware Blog
    Microsoft has disclosed that a new zero-day vulnerability is present in Windows, and is exploited via Microsoft Office files. According to Microsoft Security Advistory 3010060, the vulnerability is present in all supported versions of Windows except Windows Server 2003. The vulnerability (designated as CVE-2014-6352) is triggered by an attacker sending a specially crafted Microsoft Office file […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroMicrosoft Windows Hit By New Zero-Day Attack

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place