Content added to Folio

Research, News, and Perspectives

Add Filters
Filter by:
How Underground Groups Use Stolen Identities and Deepfakes
Social Media

How Underground Groups Use Stolen Identities and Deepfakes

The growing appearance of deepfake attacks is significantly reshaping the threat landscape. These fakes brings attacks such as business email compromise (BEC) and identity verification bypassing to new levels.

September 27, 2022
Cyber Threats

Cybersecurity Reflections from 26 Years at Trend

Trend Micro is one of the few cybersecurity vendors today that can protect your entire world, whether it is your home office and family, your drive to work, or your work environment.

Latest News Dec 08, 2022

Save to Folio

Latest News Dec 08, 2022

Save to Folio

Cyber Crime

Cyber Crime: INTERPOL Uses Trend Threat Intelligence

INTERPOL recently conducted operation African Surge to take down malicious infrastructure across the African continent and requested the help of private enterprises. Trend Micro is proud to have been asked to participate, and provided global threat intelligence that was utilized in this operation.

Expert Perspective Nov 25, 2022

Save to Folio

Expert Perspective Nov 25, 2022

Save to Folio

Ransomware

WannaRen Returns as Life Ransomware, Targets India

This blog entry looks at the characteristics of a new WannaRen ransomware variant, which we named Life ransomware after its encryption extension.

Research Nov 23, 2022

Save to Folio

Research Nov 23, 2022

Save to Folio

APT & Targeted Attacks

Earth Preta Spear-Phishing Governments Worldwide

We break down the cyberespionage activities of advanced persistent threat (APT) group Earth Preta, observed in large-scale attack deployments that began in March. We also show the infection routines of the malware families they use to infect multiple sectors worldwide: TONEINS, TONESHELL, and PUBLOAD.

Research Nov 18, 2022

Save to Folio

Research Nov 18, 2022

Save to Folio

Malware

Pilfered Keys: Free App Infected by Malware Steals Keychain Data

Open-source applications are a practical way to save money while keeping up with your productivity. However, this can be abused by threat actors to steal your data. Find out how one app was used to gather information of Apple users.

Nov 16, 2022

Save to Folio

Nov 16, 2022

Save to Folio