We’ve predicted that ransomware attacks will plateau in 2017 but will diversify in terms of attack methods as time progresses....

by Ian Kenefick (Threats Analyst) While ransomware has noticeably plateaued in today’s threat landscape, it’s still a cybercriminal staple. In fact,...

by Fyodor Yarochkin (Senior Threat Researcher) We uncovered personally identifiable information (PII) stolen from a China-based hotel chain being sold on...

By Daniel Lunghi and Ecular Xu In the process of monitoring changes in the threat landscape, we get a clearer insight...

By Junestherry Salvador  Trend Micro recently saw increased abuse of the internet query file IQY, similar to the activity detected in June...

by Jaromir Horejsi, Joseph C. Chen, Kawabata Kohei, and Kenney Lu Together with our colleagues at IssueMakersLab, we uncovered Operation Red...

This month’s Microsoft Patch Tuesday includes important updates that patch two zero-day vulnerabilities that are already being actively exploited. The first...

We have been observing a malvertising campaign via Rig exploit kit delivering a cryptocurrency-mining malware and the GandCrab ransomware since...

By Federico Maggi, Marco Balduzzi, Ryan Flores, and Vincenzo Ciancaglini Website defacement — the act of visibly altering the pages of a website, notably in the...

The financial industry has seen several changes in terms of technology, including new ATM capabilities and the increasing use and popularity of cryptocurrencies. These...