NCSC Says Newer Threats Need Network Defense Strategy
Trend Micro Blog » Threats/Malware
by
7h ago
On April 18, 2024, the UK’s Metropolitan Police Service and others conducted an operation that succeeded in taking down the Phishing-as-a-Service provider LabHost ..read more
Visit website
The Fall of LabHost: Law Enforcement Shuts Down Phishing Service Provider
Trend Micro Blog » Threats/Malware
by
7h ago
On April 18, 2024, the UK’s Metropolitan Police Service and others conducted an operation that succeeded in taking down the Phishing-as-a-Service provider LabHost ..read more
Visit website
Trend Micro Collaborated with Interpol in Cracking Down Grandoreiro Banking Trojan
Trend Micro Blog » Threats/Malware
by
7h ago
In this blog entry, we discuss Trend Micro's contributions to an Interpol-coordinated operation to help Brazilian and Spanish law enforcement agencies analyze malware samples of the Grandoreiro banking trojan ..read more
Visit website
Fileless Attacks Prompt Intel’s Next-Gen Security
Trend Micro Blog » Threats/Malware
by
1w ago
Discover how Trend is strengthening its endpoint solutions to detect fileless attacks earlier. By leveraging Intel Threat Detection Technology, Trend enhances the scalability and resiliency of its solutions ..read more
Visit website
Cyberespionage Group Earth Hundun's Continuous Refinement of Waterbear and Deuterbear
Trend Micro Blog » Threats/Malware
by
1w ago
Our blog entry provides an in-depth analysis of Earth Hundun's Waterbear and Deuterbear malware ..read more
Visit website
Importance of Scanning Files on Uploader Applications
Trend Micro Blog » Threats/Malware
by
1w ago
Delve into the crucial practice of file scanning within uploader applications, and learn defensive measures to safeguards against malicious threats like malware ..read more
Visit website
Cybersecurity Decluttered: A Journey to Consolidation
Trend Micro Blog » Threats/Malware
by
1w ago
Learn how far cybersecurity has come from scattered resources to consolidation the future ..read more
Visit website
Agenda Ransomware Propagates to vCenters and ESXi via Custom PowerShell Script
Trend Micro Blog » Threats/Malware
by
3w ago
This blog entry discusses the Agenda ransomware group's use of its latest Rust variant to propagate to VMWare vCenter and ESXi servers ..read more
Visit website
Earth Freybug Uses UNAPIMON for Unhooking Critical APIs
Trend Micro Blog » Threats/Malware
by
3w ago
This article provides an in-depth look into two techniques used by Earth Freybug actors: dynamic-link library (DLL) hijacking and application programming interface (API) unhooking to prevent child processes from being monitored via a new malware we’ve discovered and dubbed UNAPIMON ..read more
Visit website
Why a Cloud Security Platform Approach is Critical
Trend Micro Blog » Threats/Malware
by
3w ago
Explore how a cybersecurity platform with attack surface management and runtime protection capabilities can enhance your cloud security posture ..read more
Visit website

Follow Trend Micro Blog » Threats/Malware on FeedSpot

Continue with Google
Continue with Apple
OR