By Federico Maggi, Marco Balduzzi, Ryan Flores, and Vincenzo Ciancaglini Website defacement — the act of visibly altering the pages of a website, notably in the...

The financial industry has seen several changes in terms of technology, including new ATM capabilities and the increasing use and popularity of cryptocurrencies. These...

The history of antimalware security solutions has shown that malware detection is like a cat-and-mouse game. For every new detection technique, there’s a new...

By Anita Hsieh, Rubio Wu, and Kawabata Kohei Trend Micro detected a spam campaign that drops the same FlawedAmmyy RAT (remote...

by Hubert Lin, Lorin Wu, and Vit Sembera The exploitation of open ports on devices has been an on-going problem for...

Blackgear (also known as Topgear and Comnie) is a cyberespionage campaign dating back to 2008, at least based on the...

In cooperation with IssueMakersLab of South Korea Reconnaissance plays a vital role in criminal operations, and some groups go to...

by Tony Yang and Peter Lee (Consumer Yamato Team) Our IoT Smart Checker allows users to identify if connected devices (e.g....

by Loseway Lu Despite being around for decades, cybercriminals are still using malicious macro to deliver malware, albeit in more creative...