Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Unsecure gRPC Implementations Can Compromise APIs (trendmicro.com)
2 points by Abtin88 on Feb 18, 2021 | past | 1 comment
SHAREit Flaw Could Lead to Remote Code Execution (trendmicro.com)
3 points by alexrustic on Feb 16, 2021 | past | 1 comment
Threat Actors Now Target Docker via Container Escape Features (trendmicro.com)
134 points by pizza on Feb 13, 2021 | past | 44 comments
Malicious Shell Script Steals AWS, Docker Credentials (trendmicro.com)
2 points by based2 on Jan 9, 2021 | past
Exploring Control Flow Guard in Windows 10 (2015) [pdf] (trendmicro.com)
2 points by dvaun on Sept 9, 2020 | past
Malware targeting macOS developers: infecting Xcode projects to steal data [pdf] (trendmicro.com)
1 point by lknik on Aug 19, 2020 | past
XCSSET Mac Malware infects Xcode projects, performs UXSS attack on browsers (trendmicro.com)
175 points by wincent on Aug 15, 2020 | past | 53 comments
Xcsset Mac Malware: Infects Xcode Projects, Attacks Browsers, Leverages 0 Days (trendmicro.com)
1 point by wyxuan on Aug 14, 2020 | past
The Xcsset Malware: Inserts Malicious Code into Xcode Projects, Performs UXSS B [pdf] (trendmicro.com)
1 point by todsacerdoti on Aug 14, 2020 | past
Xcsset Mac Malware: Infects Xcode Projects (trendmicro.com)
2 points by qzervaas on Aug 14, 2020 | past
Where Are Cybercriminal Platforms Offered? (trendmicro.com)
1 point by kungfudoi on July 23, 2020 | past
Multiple Critical Vulnerabilities in Trend Micro Apex One and OfficeScan (trendmicro.com)
1 point by based2 on March 21, 2020 | past
An In-Depth Technical Analysis of CurveBall (CVE-2020-0601) (trendmicro.com)
2 points by aburan28 on Feb 13, 2020 | past
Running a realistic factory honeypot to capture real threats [pdf] (trendmicro.com)
23 points by Animats on Jan 24, 2020 | past | 2 comments
More Than a Dozen Obfuscated APT33 Botnets Used for Extreme Narrow Targeting (trendmicro.com)
4 points by mzs on Nov 14, 2019 | past
Skidmap Linux Malware Uses Rootkit to Hide Cryptocurrency-Mining Payload (trendmicro.com)
1 point by watchdogtimer on Sept 17, 2019 | past
Multistage Attack Can Turn Elasticsearch Databases into DDoS Botnet (trendmicro.com)
3 points by bjoko on July 24, 2019 | past
Developers/admin at risk using Android debugger (trendmicro.com)
3 points by egberts1 on July 13, 2019 | past
Phishing Attack Uses SingleFile Addon to Obfuscate Malicious Log-In Pages (trendmicro.com)
1 point by gildas on April 4, 2019 | past
A Machine Learning Model to Detect Malware Variants (trendmicro.com)
2 points by kungfudoi on March 13, 2019 | past
New SLUB Backdoor Uses GitHub, Communicates via Slack (trendmicro.com)
2 points by kungfudoi on March 7, 2019 | past
Google Play Camera Apps Send Users Pornographic Content, Collect Their Pictures (trendmicro.com)
2 points by HelenePhisher on Feb 1, 2019 | past
Command Injection and E-Stop Abuse Against Industrial Radio Remote Controllers (trendmicro.com)
2 points by code_duck on Jan 21, 2019 | past
A Security Analysis of Radio Remote Controllers for Industrial Application S [pdf] (trendmicro.com)
2 points by based2 on Jan 19, 2019 | past
Trend micro: Authentication non-existent in cranes and construction equipment (trendmicro.com)
3 points by sathackr on Jan 16, 2019 | past
Cybercriminals Use Malicious Memes That Communicate with Malware (trendmicro.com)
66 points by sus_007 on Dec 18, 2018 | past | 18 comments
Trend Micro Research Finds Major Lack of IoT Security Awareness (trendmicro.com)
1 point by Varcht on Dec 4, 2018 | past
Cryptocurrency Malware Uses Evasion Techniques, Including Windows Installer (trendmicro.com)
2 points by malik9 on Nov 9, 2018 | past
GDPR vs. Blockchain: Technology vs. The Law (trendmicro.com)
32 points by velmu on May 23, 2018 | past | 67 comments
New Phishing Scam Uses AES Encryption and Goes After Apple IDs (trendmicro.com)
4 points by vuln on May 14, 2018 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: