| | Unsecure gRPC Implementations Can Compromise APIs (trendmicro.com) |
| 2 points by Abtin88 on Feb 18, 2021 | past | 1 comment |
|
| | SHAREit Flaw Could Lead to Remote Code Execution (trendmicro.com) |
| 3 points by alexrustic on Feb 16, 2021 | past | 1 comment |
|
| | Threat Actors Now Target Docker via Container Escape Features (trendmicro.com) |
| 134 points by pizza on Feb 13, 2021 | past | 44 comments |
|
| | Malicious Shell Script Steals AWS, Docker Credentials (trendmicro.com) |
| 2 points by based2 on Jan 9, 2021 | past |
|
| | Exploring Control Flow Guard in Windows 10 (2015) [pdf] (trendmicro.com) |
| 2 points by dvaun on Sept 9, 2020 | past |
|
| | Malware targeting macOS developers: infecting Xcode projects to steal data [pdf] (trendmicro.com) |
| 1 point by lknik on Aug 19, 2020 | past |
|
| | XCSSET Mac Malware infects Xcode projects, performs UXSS attack on browsers (trendmicro.com) |
| 175 points by wincent on Aug 15, 2020 | past | 53 comments |
|
| | Xcsset Mac Malware: Infects Xcode Projects, Attacks Browsers, Leverages 0 Days (trendmicro.com) |
| 1 point by wyxuan on Aug 14, 2020 | past |
|
| | The Xcsset Malware: Inserts Malicious Code into Xcode Projects, Performs UXSS B [pdf] (trendmicro.com) |
| 1 point by todsacerdoti on Aug 14, 2020 | past |
|
| | Xcsset Mac Malware: Infects Xcode Projects (trendmicro.com) |
| 2 points by qzervaas on Aug 14, 2020 | past |
|
| | Where Are Cybercriminal Platforms Offered? (trendmicro.com) |
| 1 point by kungfudoi on July 23, 2020 | past |
|
| | Multiple Critical Vulnerabilities in Trend Micro Apex One and OfficeScan (trendmicro.com) |
| 1 point by based2 on March 21, 2020 | past |
|
| | An In-Depth Technical Analysis of CurveBall (CVE-2020-0601) (trendmicro.com) |
| 2 points by aburan28 on Feb 13, 2020 | past |
|
| | Running a realistic factory honeypot to capture real threats [pdf] (trendmicro.com) |
| 23 points by Animats on Jan 24, 2020 | past | 2 comments |
|
| | More Than a Dozen Obfuscated APT33 Botnets Used for Extreme Narrow Targeting (trendmicro.com) |
| 4 points by mzs on Nov 14, 2019 | past |
|
| | Skidmap Linux Malware Uses Rootkit to Hide Cryptocurrency-Mining Payload (trendmicro.com) |
| 1 point by watchdogtimer on Sept 17, 2019 | past |
|
| | Multistage Attack Can Turn Elasticsearch Databases into DDoS Botnet (trendmicro.com) |
| 3 points by bjoko on July 24, 2019 | past |
|
| | Developers/admin at risk using Android debugger (trendmicro.com) |
| 3 points by egberts1 on July 13, 2019 | past |
|
| | Phishing Attack Uses SingleFile Addon to Obfuscate Malicious Log-In Pages (trendmicro.com) |
| 1 point by gildas on April 4, 2019 | past |
|
| | A Machine Learning Model to Detect Malware Variants (trendmicro.com) |
| 2 points by kungfudoi on March 13, 2019 | past |
|
| | New SLUB Backdoor Uses GitHub, Communicates via Slack (trendmicro.com) |
| 2 points by kungfudoi on March 7, 2019 | past |
|
| | Google Play Camera Apps Send Users Pornographic Content, Collect Their Pictures (trendmicro.com) |
| 2 points by HelenePhisher on Feb 1, 2019 | past |
|
| | Command Injection and E-Stop Abuse Against Industrial Radio Remote Controllers (trendmicro.com) |
| 2 points by code_duck on Jan 21, 2019 | past |
|
| | A Security Analysis of Radio Remote Controllers for Industrial Application S [pdf] (trendmicro.com) |
| 2 points by based2 on Jan 19, 2019 | past |
|
| | Trend micro: Authentication non-existent in cranes and construction equipment (trendmicro.com) |
| 3 points by sathackr on Jan 16, 2019 | past |
|
| | Cybercriminals Use Malicious Memes That Communicate with Malware (trendmicro.com) |
| 66 points by sus_007 on Dec 18, 2018 | past | 18 comments |
|
| | Trend Micro Research Finds Major Lack of IoT Security Awareness (trendmicro.com) |
| 1 point by Varcht on Dec 4, 2018 | past |
|
| | Cryptocurrency Malware Uses Evasion Techniques, Including Windows Installer (trendmicro.com) |
| 2 points by malik9 on Nov 9, 2018 | past |
|
| | GDPR vs. Blockchain: Technology vs. The Law (trendmicro.com) |
| 32 points by velmu on May 23, 2018 | past | 67 comments |
|
| | New Phishing Scam Uses AES Encryption and Goes After Apple IDs (trendmicro.com) |
| 4 points by vuln on May 14, 2018 | past |
|
|
| More |