• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Karl Dominguez (Threat Response Engineer)

Karl Dominguez

Threat Response Engineer

Zero-Day Exploit Used for DUQU

  • Posted on:November 2, 2011
  • Posted in:Exploits, Targeted Attacks
  • Posted by:
    Karl Dominguez (Threat Response Engineer)
1

We have been closely monitoring developments on the DUQU malware since our initial blog post when the threat broke the news. And just recently, the Hungary-based security laboratory that initially reported about DUQU released more information that sheds more light into the nature of the said threat. Their report indicates that a Microsoft Word document…

Read More
Tags: DUQUExploits

Keeping Tabs on the Next STUXNET

  • Posted on:October 19, 2011
  • Posted in:Bad Sites, Malware
  • Posted by:
    Karl Dominguez (Threat Response Engineer)
4

The security industry is currently buzzing with talks about a threat dubbed as the precursor to the next STUXNET. According to a Symantec analysis, portions of the code are very similar to STUXNET, and was likely written by the same cybercriminals as the well-known threat. Unlike STUXNET, however, Duqu does not have code that suggests…

Read More

Android Malware Uses Blog Posts as C&C

  • Posted on:October 4, 2011
  • Posted in:Mobile
  • Posted by:
    Karl Dominguez (Threat Response Engineer)
30

Newer and more complicated Android malware variants are expected to emerge, along with the rising number of malicious Android apps. A new backdoor that we were able to analyze proves just that. Malware targeting the Android platform are continuously improving in performance as well as using new techniques to thwart analysis and to avoid detection….

Read More

Bitcoin Mining Botnet Found with DDoS Capabilities

  • Posted on:September 4, 2011
  • Posted in:Botnets, Malware
  • Posted by:
    Karl Dominguez (Threat Response Engineer)
4

Trend Micro recently came across a botnet that turns an infected system into an involuntary Bitcoin miner. Bitcoin is a digital currency that uses peer-to-peer (P2P) networks to track and verify transactions. Bitcoins are generated by a free Bitcoin miner application. The malware, detected as BKDR_BTMINE.MNR, installs the mining software in systems. It uses the…

Read More
Tags: bitcoinBotnetsddos capabilitiesMalwaremining

More Malware for Mac

  • Posted on:June 2, 2011
  • Posted in:Mac, Malware
  • Posted by:
    Karl Dominguez (Threat Response Engineer)
3

We recently reported about a blackhat search engine optimization (SEO) campaign that targeted not only Windows  but Mac users as well. It has just been a few weeks since the role of Mac users as potential victims in the threat landscape has been increasingly established but more and more threats targeting Mac users are being found. FAKEAV for…

Read More
Page 1 of 3123

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.