TrendLabs

89 Flips | 3 Magazines | 17 Followers | @TrendLabs | Keep up with TrendLabs on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “TrendLabs”

Information Stealer Found Hitting Israeli Hospitals

The abuse of shortcut (LNK) files is steadily gaining traction among cybercriminals. We’ve seen a plethora of threats that leverage malicious LNK …

Cybersecurity

Large-Scale Petya Ransomware Attack In Progress, Hits Europe Hard

A large-scale ransomware attack reported to be caused by a variant of the Petya ransomware is currently hitting various users, particularly in …

Cybersecurity

Fake News and Cyber Propaganda: The Use and Abuse of Social Media

View Fake News and Cyber Propaganda: The Use and Abuse of Social Media<p><i>By Lion Gu, Vladimir Kropotov, and Fyodor Yarochkin (Senior Threat</i> …

EternalRocks Emerges, Exploits Additional ShadowBroker Vulnerabilities

A new malware called EternalRocks was discovered in late May that uses not only EternalBlue and DoublePulsar—the two National Security Agency (NSA) …

Ransomware Recap: Business as Usual after WannaCry Surge

After the Week of WannaCry, the ransomware scene looks to be going back to normal, with the persistent ransomware known as Cerber (Detected by Trend …

Securing Smart Cities

View Securing Smart Cities<p>Trend Micro's Forward-looking Threat Research (FTR) team<p>Soon, smart technologies will be universal. Embedded sensors will …

The State of SCADA HMI Vulnerabilities

View Hacker Machine Interface: The State of SCADA HMI Vulnerabilities<p><b>Attacking SCADA Through HMIs</b><p>SCADA systems run the world’s various critical …

After WannaCry, UIWIX Ransomware and Monero-Mining Malware Follow Suit

WannaCry ransomware’s outbreak during the weekend was mitigated by having its kill switch domain registered. It was only a matter of time, however, …

Cybersecurity

Massive WannaCry/Wcry Ransomware Attack Hits Various Countries

Earlier this year, two separate security risks were brought to light: CVE-‎2017-0144, a vulnerability in the SMB Server that could allow remote code …

Cybersecurity

Rogue Robots: Testing the Limits of an Industrial Robot’s Security

View Demonstrating Industrial Robot Attacks in Today’s Smart Factories<p>The modern world relies heavily on industrial robots. But is the current …

From Espionage to Cyber Propaganda: Pawn Storm's Activities over the Past Two Years

View Two Years of Pawn Storm: Examining an Increasingly Relevant Threat<p>Pawn Storm—also known as Sednit, Fancy Bear, APT28, Sofacy, and STRONTIUM—is …

WannaCry/Wcry Ransomware: How to Defend against It

An unprecedented wave of ransomware infections is hitting organizations in all industries around the world. The culprit: the WannaCry/WCry ransomware …

Cybersecurity

WannaCry/Wcry Ransomware: What Your IT/Sysadmins Need to Do

WannaCry/<p>Wcryransomware’s impact may be pervasive, but there is a silver lining: a “kill switch” in the ransomware that, when triggered, prevents it …

Cybersecurity

How Mobile Phones Turn Into A Corporate Threat

Over the last year, the number of mobile phones overtook the world population. In countries like the United States, mobile subscribers outnumbered …

Cybersecurity

Infosec Guide: Dealing with Threats to a Bring Your Own Device (BYOD) Environment

Bring your own device (BYOD) adoption has risen greatly over the past few years as companies look to improve work efficiency and lower operational …

Information Security

Shadow Brokers Leaks Hacking Tools: What it Means for Enterprises

On April 14, several hacking tools and exploits targeting systems and servers running Microsoft Windows were leaked by hacking group Shadow Brokers. …

Information Security

Ransomware Recap: Threats from Open Source Code on the Rise

Cybercriminals from around the world are still abusing Hidden Tear, which was originally released to educate and enlighten people about ransomware. …

Cybersecurity

Malvertising: When Online Ads Attack

The cybercriminals who use malvertising (malicious advertising) as a way to victimize unsuspecting users are like good filmmakers who know how to …

Ad Blocking

Advice for Enterprises in 2014: Protect Your Core Data

Vulnerabilities for Sale

Targeted Attacks - Threat Intelligence Center

The results of a security preparedness survey reveal that more than half of organizations aren't ready to defend against online extortion and data …

Cybersecurity

Sexually Explicit Material Used as Lures in Recent Cyber Attacks

Sex sells. Cybercriminals know this and readily use it as lures, as we have seen in past spam runs that used fake YouTube links or promised photos of …

Cyber-attacks

Millions Affected in Anthem Breach, Healthcare Companies Prime Attack Targets

Tens of millions of current and former customers and employees of Anthem Inc., the second largest health insurance provider in the United States, are …

Cybersecurity

Millions of iOS Devices at Risk from ‘Operation Pawn Storm’ Spyware

iOS devices are the new poisoned pawns in the targeted attack campaign dubbed “Operation Pawn Storm,” an organized economic and political espionage …

Apps

Operation Arid Viper: Bypassing the Iron Dome

View research paper<p>In this Trend Micro research paper, we unearthed two different operations with strong Arab ties possibly located in the Gaza …

Hacktivist Group CyberBerkut Behind Attacks on German Official Websites

A pro-Russian group called CyberBerkut claimed responsibility for a recent hack on certain German government websites in early January. We were able …

Cybercrime

German Steel Plant Suffers Significant Damage from Targeted Attack

An unknown number of attackers knowledgeable in IT security and industrial control systems (ICS) processes have caused massive damage to a German …

Cybersecurity

Korean Nuclear Plant Faces Data Leak and Destruction

A South Korean nuclear company became the source of headlines when it fell victim to an attack that resulted in the leak of company information, …

North Korea

The Hack of Sony Pictures: What We Know and What You Need to Know

A week into Sony Pictures’ devastating hack attack, a series of leaked internal documents and spreadsheets containing information and data of the …

Personal Information

Data Privacy for Businesses: A Part of Doing Business

Recent data breaches in big enterprises like large banks and retail chains make one thing clear: data privacy and protection is a concern for all …

Data Protection