This research paper highlights the flaws of the WPAD protocol, describes how it works, and why it is a serious security concern, especially under the altered conditions in today’s connected world.
Pwn2Own is all about owning systems/devices—a test of technical skill to see who the best hacker is. It also demonstrated how browsers and plug-ins can be used as effective attack vectors.
This research paper looks at the mining industry as a target for a broad set of threat actors, its role in regional and global supply chains, and its vulnerabilities.
Research on the common technologies used by cybercriminals and terrorists to benefit their cause, from the services they abuse to the tools they’ve homebrewed to streamline activities.
Details of the different regional underground scenes we visited in 2015. Find out why we say the cybercriminal underground is not a huge global conglomerate, but rather a wide-ranging cluster of specialized “branches” that cater to specific needs.
Trend Micro's latest visit to the Brazilian cybercriminal underground reveals its latest trends and available services, from online banking malware to tutorial classes for new cybercriminals.