Hacker News new | past | comments | ask | show | jobs | submit | from login
Unpatched Microsoft zero-day has been exploited by DPRK, Iran, Russia, and China (trendmicro.com)
12 points by suraci 4 days ago | past | 2 comments
Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach (trendmicro.com)
3 points by aspenmayer 6 months ago | past | 1 comment
An Update on How Cybercriminals Are Using GenAI (trendmicro.com)
1 point by EmptyTarnish 11 months ago | past
An Update on How Cybercriminals Are Using GenAI (trendmicro.com)
2 points by curmudgeon22 11 months ago | past
The Fall of LabHost: Law Enforcement Shuts Down Phishing Service Provider (trendmicro.com)
2 points by NiekvdMaas on April 18, 2024 | past
The Fall of LabHost: Law Enforcement Shuts Down Phishing Service Provider (trendmicro.com)
3 points by aussieguy1234 on April 18, 2024 | past | 1 comment
Earth Lusca Employs New Linux Backdoor, Uses Cobalt Strike for Lateral Movement (trendmicro.com)
2 points by carride on Sept 19, 2023 | past
Analyzing a Facebook Profile Stealer Written in Node.js (trendmicro.com)
2 points by skilled on Sept 5, 2023 | past
Hijacking Your Bandwidth: How Proxyware Apps Open You Up to Risk (trendmicro.com)
2 points by simonpure on June 23, 2023 | past
Dridex Returns, Targets macOS Using New Entry Method (trendmicro.com)
1 point by Corrado on Jan 8, 2023 | past | 1 comment
How Underground Groups Use Stolen Identities and Deepfakes (trendmicro.com)
110 points by rntn on Sept 28, 2022 | past | 56 comments
Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus (trendmicro.com)
55 points by kevingadd on Aug 25, 2022 | past | 11 comments
Iron Tiger Compromises Chat Application Mimi (trendmicro.com)
1 point by lysergia on Aug 16, 2022 | past
Iron Tiger Compromises Chat App Mimi, Targets Windows, Mac, and Linux Users (trendmicro.com)
2 points by dlor on Aug 15, 2022 | past
macOS SUHelper Root Privilege Escalation Vulnerability: CVE-2022-22639 (trendmicro.com)
2 points by g0xA52A2A on April 5, 2022 | past
Cyclops Blink Sets Sights on Asus Routers (trendmicro.com)
2 points by zinekeller on March 20, 2022 | past
Analysis and Impact of LockBit Ransomware’s First Linux and VMware ESXi Variant (trendmicro.com)
1 point by aspenmayer on Jan 27, 2022 | past
Ready or Not for PSD2: The Risks of Open Banking (2009) [pdf] (trendmicro.com)
1 point by GoldenGateBRDG on Jan 13, 2022 | past
Biopass Rat New Malware Sniffs Victims via Live Streaming Using OBS Framework (trendmicro.com)
3 points by giuliomagnifico on July 12, 2021 | past
Bash ransomware DarkRadiation targets redhat and Debian based Linux distros (trendmicro.com)
1 point by izl on June 24, 2021 | past
Modern Ransomware's Double Extortion Tactics (trendmicro.com)
2 points by lxm on June 9, 2021 | past
XCSSET malware quickly adapts to macOS 11 and ARM/M1-based Macs (trendmicro.com)
1 point by giuliomagnifico on April 19, 2021 | past
Silver Sparrow Malware Detected on 30K M1 Mac Users -How to Remove (trendmicro.com)
2 points by kardashian38 on March 3, 2021 | past
Unsecure gRPC Implementations Can Compromise APIs (trendmicro.com)
2 points by Abtin88 on Feb 18, 2021 | past | 1 comment
SHAREit Flaw Could Lead to Remote Code Execution (trendmicro.com)
3 points by alexrustic on Feb 16, 2021 | past | 1 comment
Threat Actors Now Target Docker via Container Escape Features (trendmicro.com)
134 points by pizza on Feb 13, 2021 | past | 44 comments
Malicious Shell Script Steals AWS, Docker Credentials (trendmicro.com)
2 points by based2 on Jan 9, 2021 | past
Exploring Control Flow Guard in Windows 10 (2015) [pdf] (trendmicro.com)
2 points by dvaun on Sept 9, 2020 | past
Malware targeting macOS developers: infecting Xcode projects to steal data [pdf] (trendmicro.com)
1 point by lknik on Aug 19, 2020 | past
XCSSET Mac Malware infects Xcode projects, performs UXSS attack on browsers (trendmicro.com)
175 points by wincent on Aug 15, 2020 | past | 53 comments

Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: