Trend Micro

Experts discovered DLL hijacking issues in Kaspersky and Trend Micro solutions

Experts discovered several DLL hijacking flaws in Kaspersky Secure Connection, Trend Micro Maximum Security, and Autodesk Desktop Application. Researchers from…

6 years ago

Trend Micro rogue employee sold customer data to tech support scammers

A Trend Micro employee was spotted stealing consumer customer information and selling it to tech support scammers. TrendMicro confirmed that…

6 years ago

Welcome to Pwn2Own 2017 – Researchers hacked Adobe Reader, Edge, Ubuntu, and Safari

Pwn2Own 2017 is started, as usual, it is a great event to see hackers at work. In the first day,…

9 years ago

APT 28 group is ramping up information warfare against Germany

According to the German Intelligence, the APT 28 group, also known as Fancy Bear, is ramping up information warfare against Germany…

9 years ago

Pawn Storm APT group targets thousands Google Accounts

Russian cyber spies belonging to the Pawn Storm APT group have targeted a significant number of Google accounts belonging to…

10 years ago

Pawn Storm hackers hit the German Christian Democratic Union party

Researchers at Trend Micro discovered that Pawn Storm threat actor targeted the political party of Chancellor Angela Merkel, the Christian…

10 years ago

Pawn Storm APT targets MH17 crash investigation

The Pawn Storm APT group set up rogue VPN and SFTP servers to target Dutch Safety Board employees involved in…

10 years ago

Critical Adobe Flash Zero-Day Vulnerability Actively Being Exploited In-the-Wild

Despite both Microsoft and Adobe releasing patches on Tuesday (10/13/2015), a critical Flash zero-day flaw remains unpatched in Adobe’s latest…

10 years ago

Pawn Storm used a new Flash Zero-Day in attacks on the NATO & the While House

Researchers at Trend Micro discovered a new Adobe Flash Zero-Day used in Pawn Storm Campaign Targeting Foreign Affairs Ministries across…

10 years ago

Data breaches, stolen data and their sale in the Dark Web

Trend Micro published a report that explains the dynamics triggered by data breaches, following data from the incidents to their…

10 years ago

This website uses cookies.