by Jennifer Hernandez, Anjali Patil and Jay Yaneza (Trend Micro Cyber Safety Solutions Team) The IT teams of medium and large businesses...

by Michael Villanueva and Martin Co (Threats Analysts) The MuddyWater campaign was first sighted in 2017 when it targeted the Saudi...

By employing machine learning algorithms, we were able to discover an enormous certificate signing abuse by BrowseFox, a potentially unwanted application (PUA) detected by...

by Craig Gibson (Principal Threat Defense Architect) Already a vital part of both the internet of things and the critical infrastructure...

In January, we saw a variant of the disk-wiping KillDisk malware hitting several financial institutions in Latin America. One of...

by Marshall Chen, Loseway Lu, Kawabata Kohei, and Rubio Wu Tax season has traditionally been notorious for increased cybercrime activity, as...

by Miguel Ang, Martin Co, and Michael Villanueva (Threats Analysts) An exploit kit such as Rig usually starts off with a...

by Craig Gibson (Senior Threat Researcher) Already, current cellular network technologies such as 3G and 4G allow fast wireless communication. But...

by Jaromir Horejsi, Joseph C. Chen, and Loseway Lu We noticed a series of testing submissions in VirusTotal that apparently came...

by Daniel Lunghi and Jaromir Horejsi Back in February, we noted the similarities between the Patchwork and Confucius groups and found...