• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for December 2012

Why is the Watering Hole Technique Effective?

  • Posted on:December 31, 2012 at 5:34 am
  • Posted in:Exploits, Vulnerabilities
  • Author:
    JM Hipolito (Technical Communications)
0

Late last week, the Council on Foreign Relations website was compromised and modified to host a 0-day exploit affecting Internet Explorer. Analysis revealed that the attack was set to affect a specific set of users, as it was set to work only if the browser language was set to English (US), Chinese (China), Chinese (Taiwan),…

Read More

What Kind of Targeted Attacks Will We See in 2013?

  • Posted on:December 28, 2012 at 3:33 pm
  • Posted in:Malware, Targeted Attacks
  • Author:
    Nart Villeneuve (Senior Threat Researcher)
0

Now that knowledge of targeted attacks, including APT activity, has become mainstream within the broader security community, I predict that 2013 will be a year in which our assumptions will be challenged. We have already seen how successful so-called “technically unsophisticated” attacks have been over the last few years, and I predict they will continue…

Read More

Mobile Ad Networks: How Do They Operate?

  • Posted on:December 28, 2012 at 10:26 am
  • Posted in:Mobile
  • Author:
    Robert Musico (Technical Communications)
0

Ever wonder how those pesky pop-up ads end up on your smartphone? More importantly, do you ever consider what this seemingly harmless display of ads can do to you and your data? There are more to these ads than just taking up space and eating up your phone’s bandwidth and battery life. This month’s Mobile…

Read More
Tags: adwareandroidMobile

The Trends in Targeted Attacks of 2012

  • Posted on:December 27, 2012 at 10:55 am
  • Posted in:Targeted Attacks
  • Author:
    Nart Villeneuve (Senior Threat Researcher)
0

Throughout 2012, we investigated a variety of targeted attacks including several APT campaigns such as LuckyCat and Ixeshe, as well as updates on some long running campaigns such as Lurid/Enfal and Taidoor. There was a lot of great research within the community related to targeted attacks published this year, and I’ve clustered the research I found to…

Read More

Backdoor Disguised as Java Server Page Targets Web-hosting Servers

  • Posted on:December 27, 2012 at 8:57 am
  • Posted in:Malware
  • Author:
    Jaime Benigno Reyes (Threat Response Engineer)
0

Malware like BKDR_JAVAWAR.JG prove that web servers are viable targets by cybercriminals, as they store crucial data and can be used to infect other systems once unwitting users visit affected websites. We recently spotted a Java Server page that performs backdoor routines and gains control over vulnerable server. Trend Micro detects this as BKDR_JAVAWAR.JG. This…

Read More
Page 1 of 712 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.