Trend Micro Blog » Threats/Malware
151 FOLLOWERS
This category is about Malware & Threats, Fake Mobile Apps, Ransomware, Malicious Shell Scripts, and much more. We're a global cybersecurity leader, helping to make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, our cybersecurity platform protects hundreds of thousands of organizations and..
Trend Micro Blog » Threats/Malware
7h ago
On April 18, 2024, the UK’s Metropolitan Police Service and others conducted an operation that succeeded in taking down the Phishing-as-a-Service provider LabHost ..read more
Trend Micro Blog » Threats/Malware
7h ago
On April 18, 2024, the UK’s Metropolitan Police Service and others conducted an operation that succeeded in taking down the Phishing-as-a-Service provider LabHost ..read more
Trend Micro Blog » Threats/Malware
7h ago
In this blog entry, we discuss Trend Micro's contributions to an Interpol-coordinated operation to help Brazilian and Spanish law enforcement agencies analyze malware samples of the Grandoreiro banking trojan ..read more
Trend Micro Blog » Threats/Malware
1w ago
Discover how Trend is strengthening its endpoint solutions to detect fileless attacks earlier. By leveraging Intel Threat Detection Technology, Trend enhances the scalability and resiliency of its solutions ..read more
Trend Micro Blog » Threats/Malware
1w ago
Our blog entry provides an in-depth analysis of Earth Hundun's Waterbear and Deuterbear malware ..read more
Trend Micro Blog » Threats/Malware
1w ago
Delve into the crucial practice of file scanning within uploader applications, and learn defensive measures to safeguards against malicious threats like malware ..read more
Trend Micro Blog » Threats/Malware
1w ago
Learn how far cybersecurity has come from scattered resources to consolidation the future ..read more
Trend Micro Blog » Threats/Malware
3w ago
This blog entry discusses the Agenda ransomware group's use of its latest Rust variant to propagate to VMWare vCenter and ESXi servers ..read more
Trend Micro Blog » Threats/Malware
3w ago
This article provides an in-depth look into two techniques used by Earth Freybug actors: dynamic-link library (DLL) hijacking and application programming interface (API) unhooking to prevent child processes from being monitored via a new malware we’ve discovered and dubbed UNAPIMON ..read more
Trend Micro Blog » Threats/Malware
3w ago
Explore how a cybersecurity platform with attack surface management and runtime protection capabilities can enhance your cloud security posture ..read more