Source: trendmicro.com

VPNFilter-affected Devices Still Riddled with 19 Vulnerabilities

VPNFilter-affected Devices Still Riddled with 19 Vulnerabilities

The Aurora Power Grid Vulnerability and the BlackEnergy Trojan

The Aurora Power Grid Vulnerability and the BlackEnergy Trojan

Malicious Macro Hijacks Desktop Shortcuts to Deliver Backdoor

Malicious Macro Hijacks Desktop Shortcuts to Deliver Backdoor

Down but Not Out: A Look Into Recent Exploit Kit Activities

Down but Not Out: A Look Into Recent Exploit Kit Activities

The New Face of Necurs: Noteworthy Changes to Necurs’ Behaviors

The New Face of Necurs: Noteworthy Changes to Necurs’ Behaviors

Cryptocurrency-Mining Bot Targets Devices With Running SSH Service via Potential Scam Site

Cryptocurrency-Mining Bot Targets Devices With Running SSH Service via Potential Scam Site

How attackers are abusing high-profile users and executives

How attackers are abusing high-profile users and executives

Necurs Poses a New Challenge Using Internet Query File

Necurs Poses a New Challenge Using Internet Query File

Drupal Vulnerability (CVE-2018-7602) Exploited to Deliver Monero-Mining Malware

Drupal Vulnerability (CVE-2018-7602) Exploited to Deliver Monero-Mining Malware

FakeSpy Android Information-Stealing Malware Targets Japanese and Korean-Speaking Users

FakeSpy Android Information-Stealing Malware Targets Japanese and Korean-Speaking Users

Another Potential MuddyWater Campaign uses Powershell-based PRB-Backdoor

Another Potential MuddyWater Campaign uses Powershell-based PRB-Backdoor

Attack Vectors in Orbit: The Need for IoT and Satellite Security in the Age of 5G

Attack Vectors in Orbit: The Need for IoT and Satellite Security in the Age of 5G

How Machine Learning Techniques Helped Us Find Massive Certificate Abuse by BrowseFox

How Machine Learning Techniques Helped Us Find Massive Certificate Abuse by BrowseFox

New KillDisk Variant Hits Latin American Financial Organizations Again

New KillDisk Variant Hits Latin American Financial Organizations Again

Hackers Follow Taxpayers Post Tax Season with URSNIF Spam Campaign

Hackers Follow Taxpayers Post Tax Season with URSNIF Spam Campaign

Rig Exploit Kit Now Using CVE-2018-8174 to Deliver Monero Miner

Rig Exploit Kit Now Using CVE-2018-8174 to Deliver Monero Miner