https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8655/android-mediaserver-vulnerability-cve20153823
Trend Micro researchers discovered this vulnerability in Android devices that could potentially allow attackers to perform Denial of Service (DoS) attacks once...
threat encyclopediatrend microandroidmediaservervulnerability
https://www.trendmicro.com/vinfo/us/security/research-and-analysis/research/page/9
Access research papers and articles by our security experts and analysts
research analysistrend microus
https://www.trendmicro.com/en_us/research/23/b/earth-kitsune-delivers-new-whiskerspy-backdoor.html
We discovered a new backdoor which we have attributed to the advanced persistent threat actor known as Earth Kitsune, which we have covered before. Since 2019,...
watering hole attackearthkitsunedeliversnew
https://rode.com/en-us/products/wireless-micro-camera-kit
The RØDE Wireless Micro Camera Kit is a pocket-sized solution for capturing pristine audio – the perfect grab-and-go companion for content creators
micro camerawirelesskitus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/iot.linux.mirai.dlex
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to...
threat encyclopediatrend microiotlinuxmirai
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/fareit
FAREIT was discovered in 2012 and has been undergoing changes to bypass anti-virus detection. It is now one of the most successful information stealers...
threat encyclopediatrend microus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/lnk_stuxnet.c
This is the Trend Micro detection for shortcut files that attempts to exploit a vulnerablity in Windows Shell that could allow arbitrary commands to be...
threat encyclopediatrend microlnkstuxnetus
https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/intel-me-sps-and-txe-patched-after-discovery-of-vulnerabilities
Intel has released a security advisory on November 20 after discovering vulnerabilities in its remote administrative feature called the Management Engine (ME),...
intelspstxepatcheddiscovery
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/coinminer.unix.malxmr.aa
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
threat encyclopediatrend microunixaaus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/pe_fujacks.rc
This is a file infected by PE_FUJACKS.RC-O and PE_FUJACKS.
threat encyclopediatrend microrcus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/Backdoor.Linux.MIRAI.VWIPT
This new Mirai variant uses a total of 13 different exploits, almost all of which have been used in previous Mirai-related attacks. It has backdoor and...
threat encyclopediatrend microbackdoorlinuxmirai
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8983/24-057-december-10-2024
* indicates a new version of an existing ruleDeep Packet Inspection Rules:Ivanti Endpoint Manager1012214 - Ivanti Endpoint Manager SQL Injection...
threat encyclopediatrend microdecemberus
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-recap-clop-deathransom-and-maze-ransomware
As the new year rolls in, new developments in different ransomware strains have emerged. Here we discuss the different techniques that Clop, DeathRansom, and...
trend microransomwarerecapclopmaze
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/coinminer.ps1.malxmr.ae
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
threat encyclopediatrend microaeus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom_locky.puy
This ransomware is delivered via the Magnitude exploit kit exploiting the Adobe Flash Player vulnerability CVE-2016-1019.To get a one-glance comprehensive view...
threat encyclopediatrend microransomlockypuy
https://www.dwell.com/discover/san%20diego%20teaches%20us%20how%20micro%20living%20can%20thrive
Articles about san diego teaches us how micro living can thrive. Dwell is a platform for anyone to write about design and architecture.
san diegomicro livingarticlesteachesus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.w97m.jascrex.bsub
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.However, as of...
threat encyclopediatrend microtrojanus
https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/expert-insight-securing-smart-cars
Senior threat researcher Rainier Link talks about smart car security, the role of car manufacturers in securing vehicle systems, and security as a top...
expert insightsmart carstrend microsecuringus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/network/ddi-rule-5406
This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host...
threat encyclopediatrend microddiruleus
https://www.trendmicro.com/en_us/research/20/l/who-is-the-threat-actor-behind-operation-earth-kitsune-.html
Recently, we uncovered the Operation Earth Kitsune campaign and published a detailed analysis of its tactics, techniques, and procedures (TTPs). While...
threat actorbehindoperationearthkitsune
https://www.trendmicro.com/vinfo/us/security/news/security-technology/post-quantum-cryptography-quantum-computing-attacks-on-classical-cryptography
In this article, we confront contemporary cryptography with a (so far) hypothetical quantum computer to show how asymmetric algorithms may potentially be...
post quantum cryptographycomputingattacksclassicaltrend
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/the-evolution-of-windows-kernel-threats
In this report, we examine how these low-level threats have evolved through the years and discuss the three types of low-level threats that affect Windows...
windows kerneltrend microevolutionthreatsus
https://www.trendmicro.com/en_us/research/25/d/ctem-crem-cybersecurity-strategy.html
Learn why Continuous Threat Exposure Management (CTEM), a concept introduced by Gartner, has been gaining traction.
cybersecurity strategytrend microctemcremaligning
https://www.trendmicro.com/en_us/research/25/d/gtc-ai-security-2025.html
From quantum leaps to AI factories, GTC 2025 proved one thing: the future runs on secure foundations.
ai securitytrend microgtcnewblueprint
https://www.trendmicro.com/vinfo/us/security/news/mobile-safety/mobile-app-security-for-developers
The use of mobile apps is increasing especially among enterprises. More than ever, developers must work harder to improve the security of the apps they create....
mobile app securitytrend microdevelopersus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/plugx
PLUGX is a remote access tool (RAT) used in targeted attacks aimed toward government-related institutions and key industries. It was utilized the same way as...
threat encyclopediatrend microus
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/the-australian-web-threat-landscape
This report provides insights into the series of TorrentLocker outbreaks that targeted Australian individuals and businesses and their influence on the web...
web threattorrentlockereffectaustralianlandscape
https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/wordpress-vulnerability-independent-blog-page-hack
The blog page of a leading UK media site, The Independent got compromised, potentially exposing users to ransomware. The blog, running on an out dated...
wordpress vulnerabilitytrend microcausedindependentblog
https://www.trendmicro.com/en_us/about/customer-stories/xsolis.html
Leverages Trend Micro Platform to Support Rapid Growth for Its Frictionless Healthcare
trend microus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_pidief.asr
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the...
threat encyclopediatrend microtrojasrus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/tspy_zbot.aaa
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
threat encyclopediatrend microtspyzbotaaa
https://www.trendmicro.com/vinfo/us/security/news/mobile-safety/7-ways-to-improve-security-on-ios-device
Don't assume that iOS is safe from malware and attacks. Previous incidents have proven that it's not as safe as you thought. Here are a few ways to tighten up...
ios devicewaysimprovesecuritytrend
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/js_rovnix.d
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other...
threat encyclopediatrend microjsus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_fakeav.fgz
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.
threat encyclopediatrend microtrojus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.w97m.powload.amq
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
threat encyclopediatrend microtrojanamqus
https://www.trendmicro.com/en_us/business/products/email-and-collaboration.html
Stop phishing, ransomware, & targeted attacks on any email service including Microsoft 365 and Google Workspace using our threat defense techniques.
trend vision oneemail securitymicro uscollaboration
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/worm_palevo.kk
This malware has received attention from independent media sources and/or other security firms.To get a one-glance comprehensive view of the behavior of this...
threat encyclopediatrend microwormkkus
https://www.army-technology.com/news/newsus-army-contracts-arista-micro-grid-system/
Arista Power has secured a contract to continue development of an intelligent micro-grid system in support of the US Army Communications Electronics Research...
us armycontractsaristadevelopmentmicro
https://www.trendmicro.com/en_us/forHome/products/mobile-security.html?cm_re=ConsHomepage-_-CategoryNav-_-Mobile
The best antivirus App to protect your iOS and Android devices. Block ads, personal information trackers, and avoid unsafe Wi-Fi networks and excess data usage.
mobile securitytrend microiosandroidus
https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/crafting-an-azure-app-services-threat-model
We looked into Azure App Services and created a threat model to mitigate the impact of threats on the infrastructure and applications.
app servicesthreat modeltrend microcraftingazure
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/coinminer.linux.malxmr.uweiu
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses the...
threat encyclopediatrend microlinuxus
https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-clop?ref=mandos.io
We take a closer look at the operations of Clop, a prolific ransomware family that has gained notoriety for its high-profile attacks. We review this ransomware...
trend microransomwarespotlightclopus
https://www.trendmicro.com/vinfo/us/security/news
Security News from Trend Micro provides the latest news and updates, insight and analysis, as well as advice on the latest threats, alerts, and security trends.
security newstrend microus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_pidief.aal
This Trojan has received attention from independent media sources and/or other security firms.To get a one-glance comprehensive view of the behavior of this...
threat encyclopediatrend microtrojaalus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/pua.win64.pchunter.a
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting...
threat encyclopediatrend micropuaus
https://raspberrypi.dk/produkt/officiel-raspberry-pi-micro-usb-stroemforsyning-5v-25a-hvid-us/
Feb 27, 2024 - Officiel Strømforsyning til Raspberry Pi, 5V, 2.5A, US, Hvid Officiel Raspberry Pi strømforsyning, der leverer 2,5 Ampere. Dermed er der ingen problemer med...
raspberry pimicro usbofficielhvid
https://www.harrods.com/en-us/p/dior-prestige-la-micro-huile-de-rose-activated-serum-50ml-000000000007648509
DIOR Prestige La Micro-Huile de Rose Activated Serum (50ml). Shop with free returns and earn Rewards points for access to exclusive benefits.
de rosediorprestigelamicro
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_wmshell.a
This malware is involved in the DRIDEX malspam campaign that was spotted in early November 2014. It purports itself as a word document with malicious macro...
threat encyclopediatrend microtrojus
https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/apache-tomcat-spotted-with-vulnerabilities
Vulnerabilities in Apache Tomcat, which is deemed as the world's most widely used web application server used in over 70 percent of enterprise data centers,...
apache tomcattrend microspottedvulnerabilitiesus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/7858/may-2018-microsoft-releases-security-patches
Microsoft addresses vulnerabilities in its May security bulletin. Trend Micro Deep Security covers the following: CVE-2018-8174 - Windows VBScript Engine...
security patchesthreat encyclopediatrend micromaymicrosoft
https://www.trendmicro.com/en_us/forHome/products/antivirus-for-mac.html
Rest easy with mac antivirus protection that stops ransomware and other new web attacks before they reach you.
trend microantivirusmac
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/worm_sality.rl
Trend Micro has flagged this file infector as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. To get a...
threat encyclopediatrend microwormsalityrl
https://www.trendmicro.com/en_us/research/19/i/this-week-in-security-news-fake-apps-on-ios-and-google-play-and-social-media-security-issues.html
Learn about the evolution of EDR to XDR (and why your CISO should care), stock trading app attacks and fake gambling apps. Also, read about how Instagram and...
social media securitygoogle playfakeappsios
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom_apocalypse.a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
threat encyclopediatrend microransomapocalypseus
https://www.moomoo.com/community/feed/advanced-micro-devices-amd-us-too-bad-i-chose-any-115866628063237
$Advanced Micro Devices (AMD.US)$ It's so frustrating, any random stock I pick makes money, but yours just keeps falling. You seem to have completely lost...
advanced micro devicesamdus
https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/one-flaw-too-many-vulnerabilities-in-scada-systems
What is the current state of SCADA vulnerabilities? Staying informed is essential in the fight against exploits and cyberattacks with real-world consequences.
scada systemstrend microoneflawmany
https://rode.com/en-us/about/news-info/wireless-micro-colour-your-story
The award-winning Wireless Micro is now available in three vibrant new colours.
wirelessmicrocolourstoryus
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/electronic-healthcare-data-in-the-underground
Research on how the healthcare sector has evolved as a preferred target for cybercriminals, how stolen records are monetized, what types of data are stolen,...
health recordshealthcare datapriceelectronic
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojanspy.python.cybervolk.thloibd
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
threat encyclopediatrend micropythonus
https://www.trendmicro.com/en_us/research/21/k/bazarloader-adds-compromised-installers-iso-to-arrival-delivery-vectors.html
We observed BazarLoader adding two new arrival mechanisms to their current roster of malware delivery techniques.
bazarloaderaddscompromisedinstallersiso
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/backdoor.win32.devilshadow.theaabo
Cybercriminals take advantage of the popularity of the Zoom messaging app. This backdoor is found in a fake Zoom installer.
threat encyclopediatrend microbackdoorus
https://www.trendmicro.com/en_us/small-business/worry-free-services-suites.html?_ga=2.84377822.674697187.1538446194-533054814.1523611328
Get Worry-Free Services by Trend Micro, now all-in-one, with multi-device, endpoint, and email protection, co-managed with XDR.
multi deviceemail protectionworryfreesuites
https://www.trendmicro.com/vinfo/us/security/news/cybercrime/page/3
Get latest security news on cybercrime and digital threats from Trend Micro
trend microcybercrimeus
https://www.trendmicro.com/en_us/partners/alliance-partners/explore-alliance-partners/vce.html
Trend Micro is part of the VCE Technology Alliance Partner (TAP) Program for independent software vendors (ISV), providing server and VDI security that is...
alliance partnerstrend microvceus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/andromeda
This malware family refers to variants consisting of backdoors that are tied to the ANDROMEDA botnet. The botnet was first spotted in late 2011.
threat encyclopediatrend microandromedaus
https://www.trendmicro.com/en_us/research/26/a/pwn2own-researchers-earn-1-million-for-76-zero-days.html
Discover how TrendAI Zero Day Initiative (ZDI) identified critical vulnerabilities across connected vehicles, EV chargers, and automotive systems.
zero daysresearchersearnmilliontrend
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-all-in-one-solutions-guide
Protect, contain, and recover. Lead your organization's defense against ransomware with this comprehensive solutions guide.
solutions guidetrend microransomwareoneus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/bkdr_remosh.smf
The malware dropper, detected as BKDR_REMOSH.SML is responsible for assigning what service name the malware will use by querying certain registry entry to...
threat encyclopediatrend microbkdrsmfus
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/unmasking-task-scams-to-prevent-financial-fallout-from-fraud
This report exposes the life cycle and tactics of task scams by presenting real-world cases as well as strategies to help identify and avoid these threats.
unmaskingtaskscamspreventfinancial
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/androidos_arpush.hrxv
This is the Trend Micro detection for malicious apps that have information theft routines.This adware may be manually installed by a user.
threat encyclopediatrend microandroidosus
https://www.trendmicro.com/en_us/research/22/j/attack-surface-management-2022-trends-stats-part-2.html
In our 2022 midyear roundup part 2, we examine the most significant trends and incidents that influenced attack surface management in the first half of the...
attack surface managementtrend microreviewpart
https://www.trendmicro.com/en_us/research/17/f/reigning-king-ip-camera-botnets-challengers.html
Early last month we discussed a new Internet of Things (IoT) botnet called Persirai (detected by Trend Micro as ELF_PERSIRAI.A), which targets over 1000...
ip cameratrend microreigningkingchallengers
https://www.trendmicro.com/en_us/partners/platform-marketplace/zafran-security-zafran-threat-exposure-management-platform.html
Allows Zafran to retrieve Trend Vision One insights to support its threat exposure and risk evaluation processes.
threat exposure managementtrend microzafransecurityplatform
https://www.trendmicro.com/en_us/research/23/i/cyber-risk-management.html
Behind the scenes of the world of vulnerability intelligence and threat hunting there is an unsung hero in cyber risk management - learn who.
cyber risk managementunsung herotrend microus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/network/ddi-rule-5492
This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host...
threat encyclopediatrend microddiruleus
https://www.trendmicro.com/en_us/partners/alliance-partners/explore-alliance-partners/wind-river.html
Trend Micro collaborates with Wind River to integrate Trend Micro Virtual Network Function Suite with Wind River Titanium Cloud.
wind riveralliance partnerstrend microus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/worm_downad.kk
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
threat encyclopediatrend microwormkkus
https://www.trendmicro.com/en_us/what-is/cloud-native.html
Cloud native is a design philosophy that refers to applications that utilize cloud infrastructure for portable, scalable software. A cloud-native app is built...
cloud nativetrend microus
https://www.trendmicro.com/en_us/research/25/j/rondodox.html
The Trend Zero Day Initiative™ (ZDI) and Trend™ Research teams have identified a large-scale RondoDox botnet campaign exploiting over 50 vulnerabilities...
trend microtargetingvulnerabilitiesshotgunningexploits