North American Malware Trends: Taking a Proactive Approach to Modern Threats
by Jennifer Hernandez, Anjali Patil and Jay Yaneza (Trend Micro Cyber Safety Solutions Team) The IT teams of medium and large businesses are expected to protect their networks from high-risk enterprise threats. At the same time, they are also expected to concentrate on their main role, which is managing the day-to-day IT operations of their companies. […] more…Netkids
Children today are completely at home in the digital space. They use digital diaries and textbooks at school, communicate via instant messaging, play games on mobile devices (not to mention PCs and consoles), and create mini masterpieces on tablets and laptops. This total immersion in the digital universe is a concern for many parents, but […] more…How to Boost Security Operations Performance with Human-Machine Teaming Technology
In the lead up to the Security Operations Roadshow in Canada in May, there’s been lots of discussion on the challenges faced by security teams. (Click here for more on the Roadshow) Security operations teams today struggle with an ever-increasing number of alerts, new zero-day attacks and a lack of skilled resources. Fifty-eight percent of organizations […] more…Despite Decline in Use of Adobe Flash, Vulnerabilities Will Continue to Cause Concern
This post was researched and written with the assistance of Tim Hux, Abhishek Karnik, Asheer Malhotra, and Steve Povolny McAfee Advanced Threat Research team analysts have studied Adobe Flash Player for years because it is a popular target for attacks. As always, we advise customers to remain current with McAfee’s latest DAT versions. In this […] more…Statistics Say Don’t Pay the Ransom; but Cleanup and Recovery Remains Costly
Businesses have lost faith in the ability of traditional anti-virus products to detect and prevent ransomware. Fifty-three percent of U.S companies infected by ransomware in 2017 blamed legacy AV for failing to detect the ransomware. Ninety six percent of those are now confident that they can prevent future attacks, and 68% say this is because […] more…A Closer Look at Unpopular Software Downloads and the Risks They Pose to Organizations
By Dr. Marco Balduzzi, Senior Researcher, Forward-Looking Threat Research Team As a large cyber security vendor, Trend Micro deals with millions of threat data per day. Our Smart Protection Network (SPN), among other technologies, helps us conduct research and investigate new threats and cybercrimes to improve our ability to protect our customers. In this blog post, […] more…Separating the Signal from Noise
In security operations, we frequently talk about the difficulties in separating the signal from the noise to detect legitimate threats and disregard false alarms. Data overload is a common problem and triage becomes a critical skill to hone and develop. As the chief information security officer (CISO) for McAfee, I am aware at multiple levels […] more…Economic Impact of Cybercrime: Why Cyber Espionage isn’t Just the Military’s Problem
In a technology-driven age, entrepreneurs, organizations, and nations succeed or fail in large part based on how effectively they develop, implement, and protect technology. One of the most notable aspects of “The Economic Impact of Cybercrime” report released recently is the prominence of cyber espionage, the cyber-theft of intellectual property (IP) and business confidential information. […] more…A New Standard for Security at New Standard Corporation
From the latches on the toolbox in your garage to componentry in gigantic earth movers, New Standard Corporation provides Original Equipment Manufacturer components, assemblies, and related services for products used in the agriculture, construction, mining, industrial, and power generation industries. As at companies everywhere, New Standard has seen information security move from the back shelf […] more…Malicious Chrome Extensions Found in Chrome Web Store, Form Droidclub Botnet
The Trend Micro Cyber Safety Solutions team has discovered a new botnet delivered via Chrome extensions that affect more than half a million users. (The malicious extension is detected as BREX_DCBOT.A.) This botnet was used to inject ads and cryptocurrency mining code into websites the victim would visit. We have dubbed this particular botnet Droidclub, […] more…CONFICKER/ DOWNAD 9 Years After: Examining its Impact on Legacy Systems
The banking trojan known as DOWNAD (Detected by Trend Micro as DOWNAD family) first appeared back in 2008, where it managed to be one of the most destructive malware at the time, infecting up to 9 million computers and gaining worldwide notoriety. Despite being nearly a decade old, and years past its peak, DOWNAD, also […] more…Don’t Substitute CVSS for Risk: Scoring System Inflates Importance of CVE-2017-3735
I am a wry observer of vulnerability announcements. CVE-2017-3735—which can allow a small buffer overread in an X.509 certificate—presents an excellent example of the limitations of the Common Vulnerability Scoring System (CVSS). This scoring system is the de facto security industry standard for calculating and exchanging information about the severity of vulnerabilities. The problem is […] more…qkG Filecoder: Self-Replicating, Document-Encrypting Ransomware
by Jaromir Horejsi (Threat Researcher) We encountered a few interesting samples of a file-encoding ransomware variant implemented entirely in VBA macros called qkG (detected by Trend Micro as RANSOM_CRYPTOQKG.A). It’s a classic macro malware infecting Microsoft Word’s Normal template (normal.dot template) upon which all new, blank Word documents are based. Further scrutiny into qkG also […] more…KRACKs Against Wi-Fi Serious But Not End of the World
On October 12, researcher Mathy Vanhoef announced a set of Wi-Fi attacks that he named KRACKs, for key reinstallation attacks. These attack scenarios are against the WPA2 authentication and encryption key establishment portions of the most recent set of protocols. The technique is through key reinstallation. The attack can potentially allow attackers to send attacker […] more…How KRACK Threatens Wi-Fi’s Security Underpinnings and What It Means for You
If you grew up before, or even during the 90s, you were familiar with a world of cords. A cord for the telephone, a cord for the CD player and a cord — of course — for the internet. But around the late 80s and early 90s, things started to change. Cashier systems gained a […] more…The importance of cyber self-defense education
As recent headlines have highlighted, one thing is clear; there is still a lot of work that needs to be done in the world of cybersecurity. Whether it is companies being breached or personal data being offered to the highest bidder, it is an incredibly challenging job to keep everyone safe online. In order to […] more…More information
- Researchers propose methods for automatic detection of doxing
- Microsoft Leadership Shake-up as Veteran Exec Departs
- New Free Chrome Plugin Blocks Cryptojacking Browser Attacks
- Chinese National, Three Others Plead Guilty in Apple Counterfeiting Scheme
- Anonymous threat to bring down the Internet fizzles out
- Fortinet, Ivanti Patch High-Severity Vulnerabilities
- Embedded Software Developer Wind River Discloses Data Breach
- Coinming frenzy is making it hard for us to find aliens
- Opera breached, has code cert stolen, possibly spreads malware – advice on what to do
- Resolved: Hershey DR Network Intermittent network errors