TgToxic Malware’s Automated Framework Targets Southeast Asia Android Users
We look into an ongoing malware campaign we named TgToxic, targeting Android mobile users in Taiwan, Thailand, and Indonesia since...
Trend Micro
We look into an ongoing malware campaign we named TgToxic, targeting Android mobile users in Taiwan, Thailand, and Indonesia since...
We analyze a BEC campaign targeting large companies around the world that was leveraging open-source tools to stay under the...
In the era of digital transformation, ransomware groups are adapting to changing technology. The next evolution of ransomware could begin...
We analyze an infection campaign targeting organizations in the Middle East for cyberespionage in December 2022 using a new backdoor...
Simulation uncovers hidden features and urges greater user awareness
Stay informed and stay ahead
To establish a better security posture, you must address vulnerabilities in your attack vectors and surfaces. While these terms are...
Trend Micro researchers discovered a new ransomware that abuses the APIs of a legitimate tool called Everything, a Windows filename...
In this proof of concept, we look into one of several attack vectors that can be abused to attack the...
Discover the importance of dependency mapping and best practices for successful dependency management