Quantcast
Channel:
Browsing all 101 articles
Browse latest View live

Multistage Attack Delivers BillGates/Setag Backdoor, Can Turn Elasticsearch...

Elasticsearch is no stranger to cybercriminal abuse given its popularity and use to organizations. In fact, this year’s first quarter saw a surge of attacks — whether by exploiting vulnerabilities or...

View Article



This Week in Security News: Unpatched Systems and Lateral Phishing

This week, learn about an attack against Elasticsearch that delivers backdoors as its payload. Additionally, read how cybercriminals are turning to hijacked accounts to perform lateral phishing attacks...

View Article

Windows Server 2008 End of Support: Are you Prepared?

On July 14th, 2015, Microsoft’s widely deployed Windows Server 2003 reached end of life after nearly 12 years of support. For millions of enterprise servers, this meant the end of security updates,...

View Article

Will XDR Improve Security?

Cybercriminals and malicious hackers have been shifting their tactics, techniques, and procedures (TTPs) to improve their ability to infiltrate an organization and stay under the radar of security...

View Article

Fake Tech-Support Scams on Twitter Could Cost You, Study Warns

A report from Trend Micro detailed some of the latest ways cybercriminals are using the social media platform to defraud users of their cash. Trend Micro analyzed Twitter data over a three-day period...

View Article


Trend Micro Study Reveals Criminal Abuses of Twitter

DALLAS--( )--Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced a new study revealing how cybercriminals are abusing Twitter via tech support...

View Article

Keeping a Hidden Identity: Mirai C&Cs in Tor Network

With its notoriety for being one of the most active internet of things (IoT) malware families, Mirai is one malware family system administrators consistently keep their eye on to make sure systems and...

View Article

Latest Trickbot Campaign Delivered via Highly Obfuscated JS File

We have been tracking Trickbot banking trojan activity and recently discovered a variant of the malware (detected by Trend Micro as TrojanSpy.Win32.TRICKBOT.TIGOCDC) from distributed spam emails that...

View Article


Trend Micro First to Deliver XDR Across Email, Network, Endpoint, Server and...

Combats alert overload and maximizes security teams’ impact with broader visibility and expert security analytics for faster detection.read more

View Article


LokiBot Gains New Persistence Mechanism, Uses Steganography to Hide Its Tracks

First advertised as an information stealer and keylogger when it first appeared in underground forums, LokiBot has added various capabilities over the years. Recent activity has seen the malware family...

View Article

XDR Needs Network Data and Heres Why

As we’ve discussed in previous blogs, XDR is a better way to detect attacks within a network since it is able to coordinate and collaborate threat intelligence and data across multiple threat vectors,...

View Article

LLDBFuzzer: Debugging and Fuzzing the Apple Kernel with LLDB Script

The bug hunting space has grown significantly smaller now that most mobile operating systems feature built-in threat mitigation tools and techniques. Android 9’s control flow integrity (CFI) or pointer...

View Article

Why XDR Is A Big Deal, and Is Different from SIEM and Platforms

In Jon Clay’s post, he does a great job of explaining the evolution from EDR to XDR. In short, he explained that Endpoint Detection and Response (EDR) is great, but that having sources of information...

View Article


Cyberattack Lateral Movement Explained

Hi there, Mark Nunnikhoven from Trend Micro Research, I want to talk to you about the concept of lateral movement.read more

View Article

August Patch Tuesday: Update Fixes Wormable Flaws in Remote Desktop Services,...

The bulletin patches issues in Azure DevOps Server, Internet Explorer, Microsoft Office, Microsoft Windows, Visual Studio, to name a few. The patches address 29 vulnerabilities rated Critical and 64...

View Article


Trend Micro Nurtures Global Cybersecurity Talent Development

Global Capture The Flag provides real-world ethical hacking experience in the most critical areas for stopping attacks today.read more

View Article

Asruex Backdoor Variant Infects Word Documents and PDFs Through Old MS Office...

Since it first emerged in 2015, Asruex has been known for its backdoor capabilities and connection to the spyware DarkHotel. However, when we encountered Asruex in a PDF file, we found that a variant...

View Article


Trend Micro Positioned as a Leader Again in Gartner Magic Quadrant for...

The cybersecurity leader shares how its Apex One solution adds value for customers across the globe.read more

View Article

Trend Micro Report Reveals 265% Growth in Fileless Events

DALLAS--( )--Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today published its roundup report for the first half of 2019, revealing a surge in fileless...

View Article

Hiding in Plain Text: Jenkins Plugin Vulnerabilities

In order to make the most out of Jenkins’ modular architecture, developers make use of plugins that help extend its core features, allowing them to expand the scripting capabilities of build steps. As...

View Article
Browsing all 101 articles
Browse latest View live




Latest Images