Web Attacks
What happened on this attack and who were affected?Trend Micro researchers recently uncovered a cybercriminal operation involving SpyEye that began as early as January 2011. The said operation was orc...
Cybercriminals seem to be targeting tourists and vacationers as the recent attack TrendLabs engineers managed to catch in progress and analyze shows.In a timely slew of spam attacks, cybercriminals us...
What is a data breach?A data breach refers to the exfiltration—the release of data from a system without the knowledge or consent of its owner. This data resides in the targeted organization’s systems...
Using open source software (OSS) has, like all things, advantages and disadvantages. While these boast of convenience, ease of installation, and affordability, these can also expose your business and ...
We've recently discovered an attack that highlights the risks involved in accessing personal Webmail accounts at work. It takes advantage of a previously unpatched vulnerability in Hotmail and automat...
What is a highly targeted attack?A highly targeted attack manages to intentionally stay undetected in a network or system for a long time while successfully executing its intended payload. It typicall...
What are POPUREB malware?POPUREB variants have a bootkit component that infect systems’ master boot record (MBR) by replacing this with its own malicious MBR. Bootkits infect systems’ MBR to execute t...
What are PALEVO malware?The PALEVO family of worms has been around since the second quarter of 2009. It only gained significant press coverage, however, when some of the people behind the Mariposa bot...
PE_SALITY and PE_VIRUX are two of the most prevalent file infector families to date. Trend Micro engineers observed an increase in the number of PE_SALITY- and PE_VIRUX-infected systems in the Asia/Pa...