• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Microsoft

This Week in Security News: Facebook and Faxploits

  • Posted on:August 24, 2018
  • Posted in:Current News, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Facebook removed 652 fake accounts originating from Russia and Iran. Also, Microsoft identified and removed fake internet domains that mimicked U.S political institutions thought to be created…

Read More
Tags: Apache StrutsDeep SecurityDigital extortionfacebookMicrosoft

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of June 25, 2018

  • Posted on:June 29, 2018
  • Posted in:Network, Security, Zero Day Initiative
  • Posted by:
    Elisa Lippincott (Global Threat Communications)
0

I have never reverse engineered anything, but I did dismantle a Betamax VCR and put it back together without an instruction manual. My little brother liked to use the tape slot as a garage for his Hot WheelsÂŽ toy cars. We were usually able to take out the cars without any issues, but one day,…

Read More
Tags: AdobeAdvantechDigital VaccineGEMicrosoftOracleTippingPointWECONzero-day

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of June 18, 2018

  • Posted on:June 22, 2018
  • Posted in:Network, Security, Zero Day Initiative
  • Posted by:
    Elisa Lippincott (Global Threat Communications)
0

As I pull together the list of zero-day filters for this blog, I see all types of vulnerabilities from various vendors. My interest is always piqued when I see a vulnerability affecting a security company. The Zero Day Initiative’s (ZDI) interest was also piqued when the researcher Pagefault submitted a Bitdefender vulnerability to the ZDI…

Read More
Tags: AdobeAdvantechCrestonDigital VaccineFuji ElectricMicrosoftWECONZero Day Initiative

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of May 28, 2018

  • Posted on:June 1, 2018
  • Posted in:Network, Security, Zero Day Initiative
  • Posted by:
    Elisa Lippincott (Global Threat Communications)
0

I ended up at an urgent care clinic earlier this week and found out I have strep throat. The doctor who examined me asked me what medicine I had taken prior to my visit to help alleviate my throat pain, to which I replied, “I took a multi-symptom liquid medicine because the pain was keeping…

Read More
Tags: AdobeDigital VaccineHewlett Packard EnterpriseMicrosoftWECONZero Day Initiativezero-day filters

Evaluating The Risk Of DoubleAgent

  • Posted on:March 24, 2017
  • Posted in:Current News
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

Security startup Cybellum recently announced a new attack that they’re calling “DoubleAgent”. They’ve labelled this a zero day “attack for taking full control over major antiviruses and next-generation antiviruses”. There’s a lot to unpack here. When you’re assessing the risk any issue poses it’s always best to clearly define the issue. Let’s start there. The…

Read More
Tags: Current NewsMicrosoftVulnerabilities

Automating Security on Azure

  • Posted on:July 11, 2014
  • Posted in:Cloud Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0
Cloud security agent/bodyguard

If you’re moving your computing needs to Azure, security is probably one of your top concerns. I’ve written about this before, so I’ll assume you’ve already read it. If not, it’s worth taking a few minutes to get a grounding. Operations Once you’ve got a solid understanding of the security model in place on Azure,…

Read More
Tags: azurecloudMicrosoft

Security On Azure

  • Posted on:April 24, 2014
  • Posted in:Cloud, Partners, Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

With any public cloud, security is a shared responsibility between the cloud service provider and you, the user of those services. For IaaS offerings, this usually means the division of responsibilities is as follows:   Cloud Service Provider You Facilities Physical security Network infrastructure Virtualization layer Operating system Applications Data   If you’ve done work…

Read More
Tags: azureCloud SecurityMicrosoft

Getting Up to Speed on Azure

  • Posted on:April 22, 2014
  • Posted in:Cloud, Partners, Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

Microsoft recently held their annual Build conference. The premier developer event for Microsoft is usually quite predictable. You could safely expect a few incremental improvements in various technologies and fantastic developer sessions on current tech. See for yourself; the sessions are online from 2012 and 2013. Things were different this year. I’ll be addressing the…

Read More
Tags: azureMicrosoft

What does the Oracle at Delphi say about IaaS cloud offerings?

  • Posted on:December 17, 2012
  • Posted in:Cloud
  • Posted by:
    Trend Micro
0

Referencing Wikipedia: The Pythia , commonly known as the Oracle of Delphi, was the priestess at the Temple of Apollo at Delphi, located on the slopes of Mount Parnassus. The Pythia was widely credited for her prophecies inspired by Apollo. Amazon Web Service’s (AWS) first user conference in November 2012 was over-subscribed and sold out. Given that the company offers all the infrastructure you need…

Read More
Tags: Cloud InfrastructureCloud SecuritycloudburstingCloudSynDellhybrid-cloudiaasinfrastructure as a serviceMicrosoftOpenStackPublic CloudvCloudvirtualizationVMware

Out With the Old, In With the New, In With the Old?

  • Posted on:July 28, 2011
  • Posted in:Mobility
  • Posted by:
    Trend Micro
3

The mobile industry is a beautiful thing.  If I sit back and ponder for a minute all of the things mobile technology has enriched in my life, I could easily write a book.  The fact that I can take a picture and have it immediately shared to all of my friends and family in seconds…

Read More
Tags: consumerizationMDMMDPMicrosoftNokiaWindows Phone 7WP7
Page 1 of 212

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Offerings Are FedRAMP Authorized and Available on AWS
  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRNÂŽ Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, MĂŠxico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, EspaĂąa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.