Security News
-
Ransomware XIAOBA Repurposed as File Infector and Cryptocurrency Miner
Currently, cryptocurrency miners are heavily used by malware—we’ve seen miners injected onto ad platforms, on popular mobile devices, and servers. Malware creators change payloads to maximize their chances to make a profit, and in this volatile cryptocurrency landscape, they seem committed to integrating... Read More
-
The Cybersecurity Tech Accord: Time to Come Together to Combat Digital Threats
At Trend Micro we’re committed to making the world a safer place in which to exchange digital information. In fact, we’ve been protecting our customers from the ever-evolving threat landscape for nearly 30 years. But we know we can and must do more as an industry to combat the challenges we face today. That’s why...
-
Arm your users with knowledge to spot phishing attacks – for free!
Attendees to the Black Hat 2017 security conference said their #1 security concern and most time-consuming activity was phishing and social engineering attacks. That’s no surprise with the increase in Business Email Compromise (BEC) attacks and with most ransomware being delivered by email. But Black Hat Attendees also said the weakest link... Read More
-
Not Only Botnets: Hacking Group in Brazil Targets IoT Devices With Malware
Even before the term IoT was coined, we had the routers at the gateway, most of the time publicly exposed on the internet. In the context of the IoT, the router is perhaps the most important device for the whole infrastructure. All traffic goes through it and it allows for the provision of many... Read More
-
Leveraging the Power of AI to Stop Email Scammers
Staff members are on the frontline when it comes to cyberattacks against their employers. They’re increasingly seen by hackers as a weak link in the cybersecurity chain. That’s why most threats today come via email, aimed squarely at tricking the recipient into downloading malware, divulging log-ins or making wire transfers to the attacker. We predict...
... Read More
-
Device Vulnerabilities in the Connected Home: Uncovering Remote Code Execution and More
If there is anything to be learned from the massive attacks that have been seen on connected devices, it is that the internet of things (IoT) is riddled with vulnerabilities. We have seen this time and again with how botnets are created from system weaknesses and have harnessed poor basic security to... Read More
-
Canadian regulators asked to get tough on data privacy amid Facebook controversy
MultimediaAs U.S. lawmakers decide how best to respond to Facebook’s personal data scandal, regulators in Canada are being encouraged to do more to protect the privacy of users in this country.
... Read More -
TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 9, 2018
The interviewing process can be mentally draining. You have to look your best, say the right things, and prove that you’re the best person for the job. When I interview candidates, I love to come up with the one crazy question that isn’t on the usual list of questions that might be asked. I probably...
The post TippingPoint Threat... Read More
-
This Week in Security News: Corporate Vulnerability and Cyber Threats
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, a new cyber threat report reveals the vulnerability of small businesses and a new ransomware could infect your software to steal your passwords. Read on to learn...
-
NIST Cybersecurity Framework Series Part 5: Recover
The final part of NIST's Cybersecurity Framework is the Recover function.
The post NIST Cybersecurity Framework Series Part 5: Recover appeared first on .
Read More -
Uncovering Unknown Threats With Human-Readable Machine Learning
In this blog post, we will discuss how we developed a human-readable machine learning system that is able to determine whether a downloaded file is benign or malicious in nature.
The development of this actionable intelligent system stemmed from the question: Howcan we make our knowledge about global software... Read More
-
Sharing the Journey to GDPR Compliance
Customer data is everything at Trend Micro. As a global cybersecurity leader, protecting customer data is what we do for a living, which is why it’s important for us to put into practice what we talk to our customers about. As a demonstration of our commitment to protecting our millions of customers, we treat all...
The post Sharing the Journey to GDPR Compliance... Read More
-
Microsoft’s April Patch Tuesday Fixes Remote Code Execution Vulnerabilities in Fonts and Keyboard
Microsoft has rolled out its Patch Tuesday for April to address security issues in Internet Explorer (IE), Edge, ChakraCore, Visual Studio, Microsoft Office and Office Services and Web Apps, and Malware Protection Engine. Of the 67 listed vulnerabilities, 24 were rated critical.... Read More
-
Mirai-like Scanning Activity Detected From China, With Targets in Brazil
Our network monitoring system recently detected an enormous amount of Mirai-like scanning activity from China. From 1:00 p.m. UTC on March 31 to 12:00 a.m. UTC on April 3, our team detected an influx of activity coming from 3,423 IP addresses of scanners. Brazil appeared to be the target location of the... Read More
-
Independent lab tests again prove the excellence of Trend Micro Mobile Security for Android
Submitted by Ian Grutze For the fourth year in a row, as shown in AV Comparatives’ Anti-Virus Comparative Android Test 2018 – January 2018, Trend Micro Mobile Security for Android shows it provides 100% protection against malware. In this independent lab test, more than 200 mobile security products were tested by... Read More
-
The Role That IT Security Teams Need to Play in Connected Hospitals
The WannaCry outbreak that reportedly raked in US$1B in damage costs also forced doctors to cancel scheduled appointments, among other things, brought on warranted concern over pervasive ransomware attacks that could stem from oft-overlooked components of healthcare networks—exposed medical cyber assets and third-party partners. It’s a... Read More
-
Advancing threat protection through industry-leading research
At Trend Micro we’ve been protecting our customers around the world for 30 years. So what’s the secret to staying at the cutting edge of the industry for all this time? By investing significant resources into forward-looking threat research, we’ve been able to anticipate where the black hats are going next. Over the coming weeks...
-
Challenges in Securing Connected Hospitals
In our latest research paper on healthcare cybersecurity, Securing Connected Hospitals, which was produced in partnership with HITRUST, we examined internet-connected medical-related devices and systems such as databases, hospital admin consoles, and medical devices. We also looked into the supply chain, which has been an attack... Read More
-
Understanding Code Signing Abuse in Malware Campaigns
Using a machine learning system, we analyzed 3 million software downloads, involving hundreds of thousands of internet-connected machines, and provide insights in this three-part blog series. In the first part of this series, we took a closer look at unpopular software downloads and the risks they pose to organizations.... Read More
-
New MacOS Backdoor Linked to OceanLotus Found
We identified a MacOS backdoor (detected by Trend Micro as OSX_OCEANLOTUS.D) that we believe is the latest version of a threat used by OceanLotus (a.k.a. APT 32, OceanLotus, APT-C-00, SeaLotus, and Cobalt Kitty). OceanLotus was responsible for launching targeted attacks against human rights organizations, media organizations,... Read More
-
Cryptocurrency Web Miner Script Injected into AOL Advertising Platform
On March 25, we saw that the number of cryptocurrency web miners detected by the Trend Micro Smart Protection Network suddenly spiked. Our team tracked the web miner traffic and found that the bulk of it was linked to MSN.com in Japan. Further analysis revealed that malicious actors had modified the... Read More
-
Windows Meltdown patches open up more severe issue
Multimedia A security researcher discovered the recent Windows Meltdown patches may fix the Intel flaws but also introduced a more severe vulnerability in some versions of Windows.Language:English
Read More -
Was Your Facebook Data Actually 'Breached'? Depends On Who You Ask
MultimediaWhen Facebook co-founder Mark Zuckerberg posted a status update Wednesday on the still-unfolding Cambridge Analytica scandal, he called it an “issue,” a “mistake” and a “breach of trust.” But he didn’t say it was a data breach.
Language:English
Read More -
Researcher Cracks 'Hacker-Proof' Crypto Wallet
MultimediaA hardware wallet for virtual currencies with millions of users has been compromised by a 15-year-old security researcher.
Language:English
Read More -
Tech firms are still ill-prepared for GDPR, says Trend Micro
Subtitle:Security firm says a lack of funds and appropriate tools are to blameOnly half of the world's technology businesses have increased spending on cybersecurity solutions to comply with GDPR. That's according to a survey carried out by Trend Micro, which shows that the majority of tech firms are... Read More
-
What About The Hackers? The Security Risks Of Autonomous And Connected Cars
MultimediaFollowing the tragic death of a woman in Arizona who was struck by a self-driving Uber in autonomous mode, questions have arisen over the other risks of connected cars. In particular, hacking.... Read More
-
GandCrab Ransomware Goes 'Agile'
MultimediaThe relative quiet in ransomware attacks so far in 2018 may be a bit misleading, as ransomware developers have been busy and in some cases moving their craft forward with techniques used in enterprise software development.
... Read More -
5 biggest healthcare security threats for 2018
Subtitle:Healthcare continues to be a popular target for ransomware, cryptomining, data theft, phishing, and insider threats.Consumers are more worried now about their protected health information (PHI)... Read More
-
The Story Behind Trend Micro Research: Security Surprises, New Risk Trends Seen
MultimediaThe SecureWorld team just finished reading the latest Trend Micro report, and it's the type of threat landscape information, in plain English, you'll want to... Read More
-
How to fight the threat of malware on mobile devices
Subtitle:For the longest time, mobile malware was like Bigfoot: much rumored and discussed, but hardly ever seen in the wild. That is no longer the case.A number of recent security... Read More