• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for August 2013

The SCADA That Cried Wolf: Who Is Really Attacking Your ICS Devices Part 2

  • Posted on:August 27, 2013 at 1:25 am
  • Posted in:Targeted Attacks
  • Author:
    Kyle Wilhoit (Senior Threat Researcher)
0

The concern on ICS/SCADA security gained prominence due to high-profile attacks targeting these devices, most notably Flame and Stuxnet. However, we noted recent findings, which prove that the interest in ICS/SCADA devices as attack platforms is far from waning. We’ve all read about how insecure ICS/SCADA devices are and how certain threat actors are targeting…

Read More
Tags: APTattackdata breachFlameICSSCADAsecurityStuxnet

Brazil Fights Old Malware, Spam, and Underground Market Growth

  • Posted on:August 26, 2013 at 7:52 am
  • Posted in:Bad Sites, Malware, Spam
  • Author:
    Rowena Diocton (Technical Communications)
0

As globalization drives Brazilian industries forward, it also invites threats that aim on the weaknesses of growing market economies. Financial crimes have always topped the list of cyber security issues in Brazil, but as the country’s economy grows more people are exposed to the perks and problems of the latest computing technologies. The recent Trend…

Read More
Tags: bancosBrazilcybercrimeMalwareonline banking threatsSpam

How Can Social Engineering Training Work Effectively?

  • Posted on:August 22, 2013 at 10:35 pm
  • Posted in:Social
  • Author:
    Jim Gogolinski (Senior Threat Researcher)
0

One particular aspect of DEF CON that always gets some media coverage is the Social Engineering Capture the Flag (SECTF) contest, where participants use nothing more than a phone call to get victims at various Fortune 500 to give up bits of information. These are the sort of social engineering attacks that give security professionals…

Read More
Tags: social engineeringuser educationweb threatswhat is social engineering

How Exploit Kits Dodge Security Vendors and Researchers

  • Posted on:August 22, 2013 at 12:56 pm
  • Posted in:Bad Sites, Malware
  • Author:
    Mark Tang (Threats Analyst)
0

Websites with exploit kits are one thing that security vendors and researchers frequently try to look into, so it shouldn’t be a surprise that attackers have gone to some length to specifically dodge the good guys. How do they do it? The most basic method used by attackers is an IP blacklist. Just like security…

Read More
Tags: antivirusblackhole exploit kitbrowserbrowser securitycoolkitexploit kitMalwarestyx

Can KINS Be The Next ZeuS?

  • Posted on:August 20, 2013 at 7:08 am
  • Posted in:Malware
  • Author:
    Gelo Abendan (Technical Communications)
0

Malware targeting online banking sites naturally cause alarm among users, as they are designed to steal not only information but also money from its users. Thus it is no surprise that the surfacing of KINS, peddled as “professional-grade banking Trojan” in the underground market, raised concerns that it might become as successful as ZeuS/ZBOT had…

Read More
Tags: banking Trojaninformation theftKINSZBOTZeuS
Page 2 of 5 ‹ 123 › »

Security Predictions for 2018

  • Attackers are banking on network vulnerabilities and inherent weaknesses to facilitate massive malware attacks, IoT hacks, and operational disruptions. The ever-shifting threats and increasingly expanding attack surface will challenge users and enterprises to catch up with their security.
    Read our security predictions for 2018.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

  • New MacOS Backdoor Linked to OceanLotus Found
  • Monero-Mining HiddenMiner Android Malware Can Potentially Cause Device Failure
  • ChessMaster Adds Updated Tools to Its Arsenal
  • Cryptocurrency Miner Distributed via PHP Weathermap Vulnerability, Targets Linux Servers
  • Ransomware XIAOBA Repurposed as File Infector and Cryptocurrency Miner

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.