BEDEP malware has recently gained notoriety in the threat landscape after it played a part in two different zero-day exploits affecting Adobe Flash in early 2015. This technical paper tackles its routines and capabilities, as well as its impact.
Microsoft has enabled a new exploit mitigation mechanism in Windows 10 and 8.1 called Control Flow Guard that makes vulnerabilities more difficult to exploit. This paper takes an in-depth look at its implementation and weaknesses.
This Trend Micro paper unearths two separate but linked malware campaigns—Operation Arid Viper and Advtravel. Operation Arid Viper targets specific Israeli organizations using infrastructure in Germany with ties to Gaza in Palestine.
This research paper provides in-depth information on the operation and structure of a cybercriminal group found using fake banking apps to steal mobile banking credentials from South Korean users.
This report provides insights into the series of TorrentLocker outbreaks that targeted Australian individuals and businesses and their influence on the web threat landscape of Australia.
This Trend Micro paper introduces the Automatic Identification Systems (AIS) used in the maritime industry, and provides a general overview of the technology as well as its identified vulnerabilities and threats.
This research paper covers the cybercriminal underground market in Brazil, including the unique tools and training services created by Brazilians to attack targets that are based in the country.
Trend Micro's first look into the cybercriminal underground covers the different activities and services found in the Russian underground—the pioneer underground scene—in 2012.
This Trend Micro research looks into the emergence of the “mobile underground” in China as a result of the market's shift to mobile platforms, including mobile underground products and services.