By Echo Duan We noticed several uploaded apps on Google Play posing as legitimate voice messenger platforms, with suspicious automated functions...

by Carl Maverick R. Pascual (Threats Analyst) BLADABINDI, also known as njRAT/Njw0rm, is a remote access tool (RAT) with a myriad...

By Lorin Wu and Ecular Xu  XLoader and FakeSpy are two of the most prevalent malware families that emerged from the...

We’ve predicted that ransomware attacks will plateau in 2017 but will diversify in terms of attack methods as time progresses....

by Ian Kenefick (Threats Analyst) While ransomware has noticeably plateaued in today’s threat landscape, it’s still a cybercriminal staple. In fact,...

by Fyodor Yarochkin (Senior Threat Researcher) We uncovered personally identifiable information (PII) stolen from a China-based hotel chain being sold on...

By Daniel Lunghi and Ecular Xu In the process of monitoring changes in the threat landscape, we get a clearer insight...

By Junestherry Salvador  Trend Micro recently saw increased abuse of the internet query file IQY, similar to the activity detected in June...

by Jaromir Horejsi, Joseph C. Chen, Kawabata Kohei, and Kenney Lu Together with our colleagues at IssueMakersLab, we uncovered Operation Red...

This month’s Microsoft Patch Tuesday includes important updates that patch two zero-day vulnerabilities that are already being actively exploited. The first...