Skip to content

Threat Reports and Security Predictions

open all


Setting the Stage: Landscape Shifts Dictate Future Threat Response Strategies


2016 Trend Micro Security Predictions: The Fine Line


A Rising Tide: New Hacks Threaten Public Technologies


Bad Ads and Zero Days: Reemerging Threats Challenge Trust in Supply Chains and Best Practices


A year of destructive cyber attacks highlights the need for cyber-preparedness

TrendLabs 3Q 2014 Security Roundup: Vulnerabilities Under Attack

The Invisible Becomes Visible: Trend Micro Security Predictions for 2015 and Beyond

TrendLabs 2Q 2014 Security Roundup: Turning the Tables on Cyber Attacks

TrendLabs 1Q 2014 Security Roundup: Cybercrime Hits the Unexpected


Targeted Attack Trends: 2H 2013 Report

TrendLabs 2013 Annual Security Roundup: Cashing in on Digital Information

Good old-fashioned stick-’em-up bank heists have seemingly been pushed to the curb by digital heists in 2013.

Cybercriminals who used sophisticated techniques to get hold of credit card numbers, bank accounts, and even personally identifiable information (PII) in a matter of minutes have taken the place of traditional thieves. Information is, after all, the new currency. And with it on hand, cybercriminals can hold victims at their mercy, which should make us all realise that we stand to lose more than we think.

the Web version of the Security Roundup
Download the full report

Blurring Boundaries: Trend Micro Predictions for 2014 and Beyond

Cybercriminals and attackers will use mobile devices as well as reliable exploits to gain entry to systems. While “wearable” technologies start to gain traction, attacks to these technologies/devices will be minimal and will only be for research. Businesses and end-users alike will have to battle threats to mobile banking, as well as ensuring that their online privacy is intact.

View the Web version of the 2014 Security Predictions
Download the full report

TrendLabs 3Q 2013 Security Roundup: The Invisible Web Unmasked

News about cybercrime circulated in recent months. The takedown of Liberty Reserve, an illegal digital currency system, and the recent seizure of the online black market, Silk Road, were among the many incidents this quarter that triggered greater public awareness of online threats. The arrest of the alleged Blackhole Exploit Kit creator in October also proved that cybercrime is indeed a business that thrives right under our noses.

View the Web version of the Security Roundup
Download the full report

TrendLabs 2Q 2013 Security Roundup: Mobile Threats Go Full Throttle

Device Flaws Lead to Risky Trail

The TrendLabs 2012 Annual Security Roundup showed that the past year ushered in the post-PC era as cybercriminals embraced mobile malware use. Mobile malware remained a big problem for users this quarter though the main concern went beyond their sheer number. The discovery of OBAD malware and the “master key” vulnerability highlighted cybercriminals’ ability to find ways to exploit flaws in the Android™ ecosystem. We noted that these incidents were designed to bypass security measures and serve as other means for cybercriminals to gain control over devices.

See the web version of the TrendLabs 2Q 2013 Security Roundup
Download the full report


TrendLabs 1Q 2013 Security Roundup: Zero-Days Hit Users Hard at the Start of the Year


TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World


TrendLabs 2012 Mobile Threat and Security Roundup: Repeating History


3Q 2012 Security Roundup: Android Under Siege: Popularity Comes at a Price


2Q 2012 Security Roundup: It's Big Business... and It's Getting Personal


1Q 2012 Security Roundup: Security in the Age of Mobility


A Look Back at 2011: Information Is Currency


More in Threat Reports

open all


Piercing the HawkEye: Nigerian Cybercriminals Use a Simple Keylogger to Prey on SMBs Worldwide


FighterPOS: The One-Man PoS Malware Campaign


Australian Web Threat Landscape (2014): Observation of TorrentLocker Attacks


Analysis of the Australian and New Zealand Web Threat Landscape.


Analysis of the Australian Web Threat Landscape


Windows 8 and Windows RT: New Beginnings


Safe: A Targeted Threat


Latin American and Caribbean Cybersecurity Trends and Government Responses /

Tendencias en la seguridad cibernética en América Latina y el Caribe y respuestas de los gobiernos


SCADA in the Cloud: A Security Conundrum?


Africa: A New Safe Harbor for Cybercriminals?


Who's Really Attacking Your ICS Equipment?


Asprox Reborn


FAKEM RAT: Malware Disguised as Windows Messenger and Yahoo! Messenger


The HeartBeat APT Campaign


The Crimeware Evolution


Spear-Phishing Email: Most Favored APT Attack Bait


Police Ransomware Update


Russian Underground 101


Detecting APT Activity with Network Traffic Analysis


W32.Tinba (Tinybanker): The Turkish Incident


Adding Android and Mac OS X Malware to the APT Toolbox


Blackhole Exploit Kit: A Spam Campaign, Not a Series of Individual Spam Runs—An In-Depth Analysis


Operation Ghost Click: The Rove Digital Takedown


Automating Online Banking Fraud—Automatic Transfer System: The Latest Cybercrime Toolkit Feature


IXESHE: An APT Campaign


Luckycat Redux: Inside an APT Campaign with Multiple Targets in India and Japan


The "Police Trojan": An In-Depth Analysis


Trends in Targeted Attacks


More in Research Papers

open all


CSO Reviews Deep Discovery Inspector


Malicious Network Communications: What Are You Overlooking?


5 Predictions for 2013 and Beyond: What Should SMBs Look Out For?


Security Threats to Business, the Digital Lifestyle, and the Cloud: Trend Micro Predictions for 2013 and Beyond


Eco and Ego Apps in Japan


The Knight Fork: Defining Defence in 2013


Peter the Great vs Sun Tzu


How to Thwart the Digital Insider – An Advanced Persistent Response to Targeted Attacks


How Tough Is It to Deal With APTs?


12 Security Predictions for 2012


Malicious Redirection: A Look at DNS Changers


More in Spotlight Articles

Connect with us on