• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Archives for November 2015

DRIDEX Spam Runs Resurface Against US Targets

  • Posted on:November 25, 2015 at 4:36 am
  • Posted in:Malware, Spam
  • Author:
    Ryan Flores (Threat Research Manager)
2

DRIDEX is steadily regaining its footing in the US just over a month after its takedown orchestrated by US and UK law enforcement agencies. Taking down servers is a significant step in crippling botnets, but unless all infrastructure are destroyed and all threat actors are caught, threats like DRIDEX are bound to resurface. As such, it…

Read More
Tags: DRIDEXfinancial spamonline banking malwareSpam

Prototype Nation: Emerging Innovations in Cybercriminal China

  • Posted on:November 23, 2015 at 4:57 am
  • Posted in:Malware
  • Author:
    Lion Gu (Senior Threat Researcher)
0

Cybercrime doesn’t wait for anything or anyone. Two years after publishing our last report on the wares and services traded in the bustling Chinese underground, we found that the market’s operations have further expanded. From traditional malware, Chinese cybercriminals are now looking toward newer innovations and technologies to boost their operations. The Chinese underground now…

Read More
Tags: ATM skimmerblack marketChinese cybercrimeChinese undergroundCUEScybercrimecybercriminal undergroundcybercriminal underground economy seriesPOS

Trend Micro, NCA Partnership Leads to Arrests and Shutdown of Refud.me and Cryptex Reborn

  • Posted on:November 23, 2015 at 4:09 am
  • Posted in:Bad Sites
  • Author:
    Trend Micro Forward-Looking Threat Research Team
16

A male and a female, both aged 22 and hailing from Colchester, Essex in the United Kingdom, were arrested on suspicion of operating two services featured in many malware business models – the popular counter antivirus (CAV) service Refud.me and the crypting service Cryptex Reborn. Both services have been taken down thanks to the partnership of Trend Micro’s…

Read More
Tags: counter antiviruscryptexlaw enforcementNCArefud

Siri’s Flaw: Apple’s Personal Assistant Leaks Personal Data

  • Posted on:November 18, 2015 at 1:05 am
  • Posted in:Mobile, Social
  • Author:
    Trend Micro Forward-Looking Threat Research Team
4

Siri for iOS devices has made everyday tasks easier; whether it is getting directions to the nearest gas station or staying in contact with growing social media networks. iOS users can just call out a contact’s name and the device will populate with a telephone number and email address. However, convenience comes with a price: personal information. What…

Read More
Tags: Appledata leakiOSSiri

3Q 2015 Security Roundup: Current Threats Forecast Impending Attack Scenarios

  • Posted on:November 17, 2015 at 5:00 am
  • Posted in:Exploits, Mobile, Targeted Attacks, Vulnerabilities
  • Author:
    Trend Micro
0

When experts call on people to brace for disaster, it’s always based on signs that point to impending events. This quarter, we saw numerous signposts pointing to hazards to sensitive data that could lead to damages to individuals’ personal lives and organizations’ operations. The high-profile breaches, vulnerability exploits, and other attacks we saw this past…

Read More
Tags: androidashley madisondata breachDeep Webexploit kitHacking TeamPawn Stormvulnerability
Page 1 of 3123

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.