Ricerca e rapporti

Operation Earth Kitsune: Tracking SLUB’s Current Operations

A watering hole campaign we dubbed as Operation Earth Kitsune is spying on users’ systems through compromised websites. Using SLUB and two new malware variants, the attacks exploit vulnerabilities including those of Google Chrome and Internet Explorer.

Leggi l'articolo   

Keeping abreast of today’s threat landscape is non-negotiable. Enterprises, service providers, and the Internet-at-large would benefit in knowing the latest in technology and threats so they can actively secure their data and systems against compromise. Skimming security news provides a high-level idea of what’s going on in the real world, but to build effective security strategies, organizations and individuals need to get a better look of what goes on beyond the surface.

Ricerca

Access research papers and articles by our security experts and analysts
Leggi l'articolo


Ultimi aggiornamenti

Operation Earth Kitsune: Tracking SLUB’s Current Operations

A watering hole campaign we dubbed as Operation Earth Kitsune is spying on users’ systems through compromised websites. Using SLUB and two new malware variants, the attacks exploit vulnerabilities including those of Google Chrome and Internet Explorer.
Leggi l'articolo

    Rapporti sulla sicurezza

    Download our latest TrendLabs Security Roundups and Predictions reports
    Leggi l'articolo


    Ultimi aggiornamenti

    Proteggere i luoghi di lavoro durante una pandemia: il report sulla cybersecurity del primo semestre 2020 di Trend Micro

    Il nostro riepilogo sulla sicurezza del primo semestre 2020 approfondisce le sfide che si presentano durante una pandemia, comprese le minacce associate al Covid-19 e gli attacchi ransomware mirati.
    Leggi l'articolo

      Download our latest TrendLabs Security Predictions

      Ultimi aggiornamenti

      Trend Micro Security Predictions for 2020: The New Norm

      Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
      Leggi l'articolo