Threat Reports
- The biggest incidents in the first three months of 2015 showed that even the most security-savvy users and organizations are not immune to security threats. See how they affected established security measures in the Trend Micro 2015 1Q Security Roundup.Analysis and insight on targeted attack cases in 2014, with information on state-sponsored attacks and the new tools and techniques used.2014 Annual Security Roundup: 2014 was the year of mega breaches, hard-to-patch vulnerabilities, and thriving cybercriminal underground economies.A look into the threat landscape during the third quarter of 2014 reveals the loopholes and vulnerabilities in often overlooked targets such as routers and PoS systems that were used as attack vectors.During the first half of 2014, attacks against Asia-Pacific countries showed some notable techniques used by attackers to evade detection and steal data. This report details the targeted attack campaigns and trends over that period.Learn about the biggest mobile threats and more from the first half of 2014.A closer look at the security landscape during 2Q 2014, as various industry players turned the tables on cyber attacks such as Heartbleed and DDoS.The latter half of 2013 lay witness to two new targeted attack campaigns: BLYPT, which hosts its servers in Romania and Turkey, and Esile, which targets government agencies in APAC to execute remote commands.