• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   roundup

[1Q 2015 Security Roundup] Bad Ads and Zero Days: Reemerging Threats Challenge Trust in Supply Chains and Best Practices

  • Posted on:May 19, 2015 at 4:58 am
  • Posted in:Malware
  • Author:
    Trend Micro
0

Best practices are failing. No matter how good you are at sticking to them, they can no longer guarantee your safety against the simplest threats we saw last quarter. Malicious advertisements are in the sites you frequent, data-leaking apps come preinstalled in your gadgets, and data-encrypting malware run silently in your office networks. Even the…

Read More
Tags: 1Q 2015malvertisementsMalwareroundupsecurity roundupzero-day vulnerabilities

1Q Security Roundup: Zero-Days Dominate

  • Posted on:April 22, 2013 at 9:10 pm
  • Posted in:Bad Sites
  • Author:
    Trend Micro
0

Looking back at the first quarter of the year, the highlight – or, perhaps more appropriately, lowlight – was clear. Popular software packages like Reader/Acrobat, Flash, and Java all had to deal with multiple zero-day exploits in the month – exploits that became widely available in underground circles long before any patches were made available by the…

Read More
Tags: 1Q 2013roundup

2012 Annual Security Roundup: Post-PC Threats

  • Posted on:January 23, 2013 at 5:00 am
  • Posted in:Exploits, Malware, Mobile, Social, Vulnerabilities
  • Author:
    Trend Micro
0

The “post-PC era” is a phrase which has been a veritable buzzword for some time. However, 2012 saw cybercrime expanding to mobile platforms, highlighting how threats have entered the post-PC era, too. Mobile Threats: 350,000 and Growing By the end of 2012, the number of Android malware grew to 350,000. This was a monumental growth…

Read More
Tags: 2012roundup

Attacks Get Personal in Q2

  • Posted on:July 25, 2012 at 8:43 am
  • Posted in:Bad Sites, Malware
  • Author:
    Danielle Veluz (Technical Communications)
0

Over time, attackers continuously update their tactics to respond to security experts’ countermeasures. In a constant game of cat and mouse, attackers shifted tactics using several notable tools and techniques alongside the usual. The security roundup for the second quarter presents key highlights and developing trends in the security landscape. Trend Micro research in the second…

Read More
Tags: androidATSAutomatic Transfer Systemblackhole exploit kitBOTPANDACVEcybercrimeFacebookIXESHEmalicious URLMalwareMobilePinterestPolice TrojanQ2 2012 threat roundupQ2 rounduproundupsmall and medium-sized businessSMBsocial mediaSpamspying toolthreat roundupvulnerability

February Malware Roundup

  • Posted on:March 6, 2008 at 11:10 pm
  • Posted in:Bad Sites, Exploits, Malware, Spam, Vulnerabilities
  • Author:
    Jasper Pimentel (Advanced Threats Researcher)
0

February started off with some compromised tour sites, one about Thailand and the other about the Pyrenees Mountains in Spain. As Valentine’s Day approached, numerous mailboxes probably received spammed messages containing a link where NUWAR’s latest variant could be downloaded. The rest of the month was filled with spammed messages, uncovered exploits and compromised Web…

Read More
Tags: Malwareroundup

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.