Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
The AI-Fication of Cyberthreats (trendmicro.com)
2 points by runningmike 5 days ago | past | discuss
EvilAI Operators Use AI-Generated Code and Fake Apps for Far-Reaching Attacks (trendmicro.com)
3 points by LiamPowell 13 days ago | past | 1 comment
EvilAI Operators Use AI-Generated Code and Fake Apps for Far-Reaching Attacks (trendmicro.com)
2 points by LiamPowell 16 days ago | past | 1 comment
ZeroDisco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits (trendmicro.com)
2 points by campuscodi 57 days ago | past
Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI Agent (trendmicro.com)
1 point by janandonly 5 months ago | past
A Closer Exploration of Residential Proxies and Captcha-Breaking Services (trendmicro.com)
4 points by avidiax 6 months ago | past
Unpatched Microsoft zero-day has been exploited by DPRK, Iran, Russia, and China (trendmicro.com)
13 points by suraci 7 months ago | past | 2 comments
Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach (trendmicro.com)
3 points by aspenmayer on Oct 26, 2024 | past | 1 comment
An Update on How Cybercriminals Are Using GenAI (trendmicro.com)
1 point by EmptyTarnish on May 13, 2024 | past
An Update on How Cybercriminals Are Using GenAI (trendmicro.com)
2 points by curmudgeon22 on May 10, 2024 | past
The Fall of LabHost: Law Enforcement Shuts Down Phishing Service Provider (trendmicro.com)
2 points by NiekvdMaas on April 18, 2024 | past
The Fall of LabHost: Law Enforcement Shuts Down Phishing Service Provider (trendmicro.com)
3 points by aussieguy1234 on April 18, 2024 | past | 1 comment
Earth Lusca Employs New Linux Backdoor, Uses Cobalt Strike for Lateral Movement (trendmicro.com)
2 points by carride on Sept 19, 2023 | past
Analyzing a Facebook Profile Stealer Written in Node.js (trendmicro.com)
2 points by skilled on Sept 5, 2023 | past
Hijacking Your Bandwidth: How Proxyware Apps Open You Up to Risk (trendmicro.com)
2 points by simonpure on June 23, 2023 | past
Dridex Returns, Targets macOS Using New Entry Method (trendmicro.com)
1 point by Corrado on Jan 8, 2023 | past | 1 comment
How Underground Groups Use Stolen Identities and Deepfakes (trendmicro.com)
110 points by rntn on Sept 28, 2022 | past | 56 comments
Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus (trendmicro.com)
55 points by kg on Aug 25, 2022 | past | 11 comments
Iron Tiger Compromises Chat Application Mimi (trendmicro.com)
1 point by lysergia on Aug 16, 2022 | past
Iron Tiger Compromises Chat App Mimi, Targets Windows, Mac, and Linux Users (trendmicro.com)
2 points by dlor on Aug 15, 2022 | past
macOS SUHelper Root Privilege Escalation Vulnerability: CVE-2022-22639 (trendmicro.com)
2 points by g0xA52A2A on April 5, 2022 | past
Cyclops Blink Sets Sights on Asus Routers (trendmicro.com)
2 points by zinekeller on March 20, 2022 | past
Analysis and Impact of LockBit Ransomware’s First Linux and VMware ESXi Variant (trendmicro.com)
1 point by aspenmayer on Jan 27, 2022 | past
Ready or Not for PSD2: The Risks of Open Banking (2009) [pdf] (trendmicro.com)
1 point by GoldenGateBRDG on Jan 13, 2022 | past
Biopass Rat New Malware Sniffs Victims via Live Streaming Using OBS Framework (trendmicro.com)
3 points by giuliomagnifico on July 12, 2021 | past
Bash ransomware DarkRadiation targets redhat and Debian based Linux distros (trendmicro.com)
1 point by izl on June 24, 2021 | past
Modern Ransomware's Double Extortion Tactics (trendmicro.com)
2 points by lxm on June 9, 2021 | past
XCSSET malware quickly adapts to macOS 11 and ARM/M1-based Macs (trendmicro.com)
1 point by giuliomagnifico on April 19, 2021 | past
Silver Sparrow Malware Detected on 30K M1 Mac Users -How to Remove (trendmicro.com)
2 points by kardashian38 on March 3, 2021 | past
Unsecure gRPC Implementations Can Compromise APIs (trendmicro.com)
2 points by Abtin88 on Feb 18, 2021 | past | 1 comment

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: