Trend Micro
-
News
Samsung Galaxy S22 Hacked on Pwn2Own
Toronto hosts the annual Pwn2Own hacking competition — during the first day, participants successfully hacked a Samsung Galaxy S22 smartphone…
Read More » -
News
Water Labbu Hack Group Hacks Cryptocurrency Scam Sites
Researchers have again found a funny example of how hackers can attack other hackers: a hacking group known as Water…
Read More » -
News
The organizers of the Pwn2Own hacker contest Will Offer Participants to Hack Remote Employees
Representatives of the Trend Micro Zero Day Initiative (ZDI) announced the main goals and prizes for the upcoming Pwn2Own hacker…
Read More » -
News
Ikea fights cyberattack on company mail system
Media reports that Ikea is fighting an ongoing cyberattack on its email system by using internal phishing against employees using…
Read More » -
News
June patch does not fully fix 0-day vulnerabilities in Windows
In May 2020, Trend Micro Zero Day Initiative researchers reported about five unpatched 0-day vulnerabilities in Windows, four of which…
Read More » -
News
APT33 Iranian group created its own VPN-network, but this only deteriorated privacy
Trend Micro analysts have long been watching the Iranian hack group APT33, which has been active since at least 2013…
Read More » -
News
Trend Micro employee sold customers’ data to scammers
Trend Micro reported an unpleasant incident that occurred this summer: company’s employee was selling user data to scammers. An insider…
Read More » -
News
Attackers try to use the new Capesand exploit pack with old code
Attackers are testing the Capesand exploit pack, which is under active development. The analysis showed that the new tool borrows…
Read More » -
News
Valve restricts CS: GO key trading because it assists in money laundering
This week, Valve announced that from now on, the keys for Counter-Strike Global Offensive (CS: GO) lootboxes cannot be sold…
Read More » -
News
iOS URL schemes allow conducting App-in-the-Middle attack
Trend Micro experts found that the URL scheme could allow an attacker to compromise iOS user accounts using the App-in-the-Middle…
Read More »