ResearchAnalysis

The Evolution of Windows Kernel Threats

In this report, we examine how these low-level threats have evolved through the years and discuss the three types of low-level threats that affect Windows systems. The categorization of more than 60 of the most noteworthy Windows low-level threats observed in the wild from 2015 to 2022 and where these threats stand in today’s threat landscape are discussed.

Lire la suite   

Keeping abreast of today’s threat landscape is non-negotiable. Enterprises, service providers, and the Internet-at-large would benefit in knowing the latest in technology and threats so they can actively secure their data and systems against compromise. Skimming security news provides a high-level idea of what’s going on in the real world, but to build effective security strategies, organizations and individuals need to get a better look of what goes on beyond the surface.

Research

Access research papers and articles by our security experts and analysts
Lire la suite


LatestUpdates

The Evolution of Windows Kernel Threats

In this report, we examine how these low-level threats have evolved through the years and discuss the three types of low-level threats that affect Windows systems. The categorization of more than 60 of the most noteworthy Windows low-level threats observed in the wild from 2015 to 2022 and where these threats stand in today’s threat landscape are discussed.
Lire la suite

    Threat Reports

    Download our latest TrendLabs Security Roundups and Predictions reports
    Lire la suite


    LatestUpdates

    Défendre la surface d'attaque en expansion: Rapport semestriel sur la cybersécurité Trend Micro 2022

    Dans notre rapport semestriel sur la sécurité, nous relatons les faits de sécurité les plus importants qui ont eu un impact considérable sur le contexte des menaces au cours du premier semestre de l'année.
    Lire la suite

      Download our latest TrendLabs Security Predictions

      LatestUpdates

      Trend Micro Security Predictions for 2023: Future/Tense

      Enterprises and organizations are facing a period of transition and uncertainty – malicious actors will hunker down and reuse tried-and-tested tools and techniques.
      Lire la suite