Corporate Partners

Top IT Security Bloggers

TrendLabs - Malware Blog
  • Attack Gains Foothold Against East Asian Government Through “Auto Start”

    TrendLabs - Malware Blog
    East Asian government agencies came under siege when attackers targeted several servers within their networks. The said attackers, who showed familiarity and in-depth knowledge of their agencies’ network topology, tools, and software, were able to gain access to their targeted servers and install malware. After which, they used the compromised servers not only as gateways to […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroAttack Gains Foothold Against East Asian Government Through “Auto Start”
  • New Router Attack Displays Fake Warning Messages

    TrendLabs - Malware Blog
    Just because security researchers report about threats doesn’t mean we’re exempted from them. I recently experienced an incident at home that involved tampered DNS router settings. I was redirected to warning pages that strongly resemble those used in previous FAKEAV attacks. I noticed that my home internet router DNS settings have been modified from its default settings. (My router […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroNew Router Attack Displays Fake Warning Messages
  • Logjam Breaks Secure Key Exchange… Sometimes

    TrendLabs - Malware Blog
    Another flaw has been found in the basic encryption algorithms that secure the Internet. This flaw, named the Logjam attack by its discoverers (researchers from various universities and companies), allows an attacker that can carry out man-in-the-middle attacks to weaken the encryption used in secure connections (such as HTTPS, SSH, and VPNs). In theory, this means that […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroLogjam Breaks Secure Key Exchange… Sometimes
  • Steganography and Malware: Final Thoughts

    TrendLabs - Malware Blog
    Steganography will only become more popular, especially among the more industrious malware groups out there. For an attacker, the ability to hide stuff in plain sight is like peanut butter on chocolate: it makes their favorite thing even better. In the first two entries of this series, we explored which steganographic techniques are used by attackers to […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroSteganography and Malware: Final Thoughts
  • Mile-High Hacking: Should You Worry?

    TrendLabs - Malware Blog
    For the past couple of days the security industry has been discussing claims that the systems of a commercial aircraft was “hacked” via the on-board inflight entertainment system (IFE). This became public after a search warrant was obtained by media outlets which revealed that the Federal Bureau of Investigation had applied for a search warrant […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroMile-High Hacking: Should You Worry?
  • [1Q 2015 Security Roundup] Bad Ads and Zero Days: Reemerging Threats Challenge Trust in Supply Chains and Best Practices

    TrendLabs - Malware Blog
    Best practices are failing. No matter how good you are at sticking to them, they can no longer guarantee your safety against the simplest threats we saw last quarter. Malicious advertisements are in the sites you frequent, data-leaking apps come preinstalled in your gadgets, and data-encrypting malware run silently in your office networks. Even the […]Post from: Trendlabs Security Intelligence Blog - by Trend Micro[1Q 2015 Security Roundup] Bad Ads and Zero Days: Reemerging Threats Challenge Trust in Supply Chains and Best Practices
  • Mobile Certificates and Developer Accounts: Who is Faking It?

    TrendLabs - Malware Blog
    Companies risk losing all their customers if they continue neglecting their app store presence. While malicious mobile apps do bring serious security concerns to the fore, (70% of top free apps have fake and mostly malicious versions in app stores) companies and developers also face another challenge in the form of copycats. For a company […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroMobile Certificates and Developer Accounts: Who is Faking It?
  • Organizational Challenges in the Internet of Things

    TrendLabs - Malware Blog
    As a result of the increase in cyber-attacks launched by nation-states, cybercriminals, hacktivist groups and other entities, it has become increasingly important to understand the ecosystem of hardware, O/S, software, and services that are used in each organization’s network, including the data/telemetry that is collected and sent outside the organization’s network. This problem is especially magnified with […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroOrganizational Challenges in the Internet of Things
  • Operation Tropic Trooper: Old Vulnerabilities Still Pack a Punch

    TrendLabs - Malware Blog
    Major government sectors and corporations in both Taiwan and the Philippines have become the latest targets in an ongoing attack campaign in the Asia Pacific region. The threat actors behind Operation Tropic Trooper—we named specifically for its choice of targets—aim to steal highly classified information from several Taiwanese government ministries and heavy industries as well […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroOperation Tropic Trooper: Old Vulnerabilities Still Pack a Punch
  • (Un)lucky 13: Thirteen Bulletins In May Patch Tuesday, Three Critical

    TrendLabs - Malware Blog
    This month’s Patch Tuesday release can be considered relatively light with only three Critical bulletins, with the remaining 10 bulletins rated as Important. As is usually the case, the cumulative update for Internet Explorer (MS15-043) is one of those rated as Critical. MS15-044 addresses critical vulnerabilities in Microsoft Font driver, which could allow remote code execution […]Post from: Trendlabs Security Intelligence Blog - by Trend Micro(Un)lucky 13: Thirteen Bulletins In May Patch Tuesday, Three Critical

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place