TrendMicro

Trend Micro fixes a critical flaw in ServerProtec Solution, patch it now!Trend Micro fixes a critical flaw in ServerProtec Solution, patch it now!

Trend Micro fixes a critical flaw in ServerProtec Solution, patch it now!

Trend Micro has addressed a critical authentication bypass vulnerability, tracked as CVE-2021-36745, affecting the ServerProtect solution. Trend Micro has released security patches…

4 years ago
Google hacker criticized TrendMicro for critical flawsGoogle hacker criticized TrendMicro for critical flaws

Google hacker criticized TrendMicro for critical flaws

A hacker with Google Project Zero research team, publicly disclosed critical vulnerabilities in the TrendMicro Antivirus. Tavis Ormandy, a researcher…

9 years ago
A new strain of banking trojan VAWTRAK uses Macros and abuses Windows PowerShellA new strain of banking trojan VAWTRAK uses Macros and abuses Windows PowerShell

A new strain of banking trojan VAWTRAK uses Macros and abuses Windows PowerShell

Security experts at TrendMicro observed significant improvements in VAWTRAK banking trojan which couples use malicious macros and Windows PowerShell. Early…

10 years ago
TrendMicro analyzed the wiper malware that infected Sony PicturesTrendMicro analyzed the wiper malware that infected Sony Pictures

TrendMicro analyzed the wiper malware that infected Sony Pictures

TrendLabs has analyzed the Destructive malware mentioned in the FBI warnings recently issued and they have linked it to cyber…

10 years ago
Hacking RFID payment smart cards with an Android AppHacking RFID payment smart cards with an Android App

Hacking RFID payment smart cards with an Android App

TrendMicro explained the mechanisms behind the hacking of RFID payment smartcards, explained how to do it with an Android App.…

11 years ago
The millionaire business behind the use of Limitless and Predator Pain Keylogger/RATs in the criminal ecosystemsThe millionaire business behind the use of Limitless and Predator Pain Keylogger/RATs in the criminal ecosystems

The millionaire business behind the use of Limitless and Predator Pain Keylogger/RATs in the criminal ecosystems

Trend Micro issued a research paper on operations behind Predator Pain and Limitless keyloggers, both of which are easily obtainable…

11 years ago
Operation Huyao, the scary evolution of phishing attacksOperation Huyao, the scary evolution of phishing attacks

Operation Huyao, the scary evolution of phishing attacks

Security experts at TrendMicro have discovered a new Phishing technique dubbed Operation Huyao that it very hard to detect by…

11 years ago
Google Drive once again exploited in a sophisticated phishing attackGoogle Drive once again exploited in a sophisticated phishing attack

Google Drive once again exploited in a sophisticated phishing attack

Cybercriminals and states-sponsored hackers are leveraging Google Drive site and other cloud storage to operate in a stealthy way and…

11 years ago
The HTTPS Phishing Websites will double by the end of 2014The HTTPS Phishing Websites will double by the end of 2014

The HTTPS Phishing Websites will double by the end of 2014

According to the investigation conducted by experts at TrendMicro the number of HTTPS phishing sites is increasing and it will…

11 years ago
Trend Micro report on Chinese Mobile Underground MarketTrend Micro report on Chinese Mobile Underground Market

Trend Micro report on Chinese Mobile Underground Market

This report provides a brief overview of some basic underground activities in the mobile space in China, describing products and…

11 years ago