Click here to download all references as Bib-File.
2022-03-24 ⋅ Trend Micro ⋅ Keeping Assets Safe From Cryptocurrency Scams and Schemes (Technical Brief) |
2022-02-16 ⋅ Trend Micro ⋅ SMS PVA Services' Use of Infected Android Phones Reveals Flaws in SMS Verification Guerrilla |
2021-11-13 ⋅ Trend Micro ⋅ QAKBOT Loader Returns With New Techniques and Tools QakBot |
2021-11-12 ⋅ Trend Micro ⋅ The Prelude to Ransomware: A Look into Current QAKBOT Capabilities and Global Activities QakBot |
2021-06-08 ⋅ Trend Micro ⋅ Modern Ransomware’s Double Extortion Tactics and How to Protect Enterprises Against Them Nefilim |
2021-04-30 ⋅ Trend Micro ⋅ How Cybercriminals Abuse OpenBullet for Credential Stuffing |
2021-01-25 ⋅ Trend Micro ⋅ Fake Office 365 Used for Phishing Attacks on C-Suite Targets |
2020-10-06 ⋅ Trend Micro ⋅ The Hacker Infrastructure and Underground Hosting: Cybercrime Modi Operandi and OpSec |
2020 ⋅ Trend Micro ⋅ The Hacker Infrastructureand Underground Hosting:Services Used by Criminals |