Are IoT Threats Discussed In The Cybercriminal Underground?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 10 Sep 2019 12:29:09 +0000

With IoT devices expected to reach tens of billions in the next few years, is it any wonder that cybercriminals are looking for ways to take advantage of this massive attack surface to generate illicit money? A number of Trend Micro researchers from around the globe decided to look into this and launched a research…

The post Are IoT Threats Discussed In The Cybercriminal Underground? appeared first on .

Read more

This Week in Security News: Ransomware Campaigns Persist with WannaCry as Most Common

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 03 Sep 2019 17:36:02 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how a total of 118 new ransomware families emerged in the first half of 2018, but only 47 new ones debuted in the first six…

The post This Week in Security News: Ransomware Campaigns Persist with WannaCry as Most Common appeared first on .

Read more

Three Common Email Security Mistakes That MSPs Make

Credit to Author: Trend Micro| Date: Tue, 27 Aug 2019 20:20:02 +0000

  MSPs can generate recurring revenue by being proactive about educating customers about email threats and how to defeat them—if they avoid three common mistakes.   Businesses have come to rely on cloud email and file-sharing applications for communication and productivity. But, too often, they assume these platforms’ built-in security delivers enough protection against email-borne…

The post Three Common Email Security Mistakes That MSPs Make appeared first on .

Read more

Cyberattack Lateral Movement Explained

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Mon, 12 Aug 2019 15:11:56 +0000

[Lightly edited transcript of the video above] Hi there, Mark Nunnikhoven from Trend Micro Research, I want to talk to you about the concept of lateral movement. And the reason why I want to tackle this today is because I’ve had some conversations in the last few days that have really kind of hit that…

The post Cyberattack Lateral Movement Explained appeared first on .

Read more

This Week in Security News: Unpatched Systems and Lateral Phishing

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 26 Jul 2019 12:57:24 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about an attack against Elasticsearch that delivers backdoors as its payload. Additionally, read how cybercriminals are turning to hijacked accounts to perform lateral phishing attacks on…

The post This Week in Security News: Unpatched Systems and Lateral Phishing appeared first on .

Read more

This Week in Security News: Spam Campaigns and Mobile Malware

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 19 Jul 2019 16:35:00 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about a mobile malware that infects Android devices by exploiting the vulnerabilities found within the operating system. Also, read about a recent spam campaign that targets…

The post This Week in Security News: Spam Campaigns and Mobile Malware appeared first on .

Read more

No man’s land: How a Magecart group is running a web skimming operation from a war zone

Credit to Author: Threat Intelligence Team| Date: Thu, 18 Jul 2019 15:00:13 +0000

We take a look into a Magecart group’s web skimming activities, which are relying on a bulletproof-friendly host in battle-scarred Luhansk, Ukraine to provide cover for their activities, safe from the reach of law enforcement and the security community.

Categories:

Tags:

(Read more…)

The post No man’s land: How a Magecart group is running a web skimming operation from a war zone appeared first on Malwarebytes Labs.

Read more

New Azure Marketplace Pay-As-You-Go Billing for Trend Micro Deep Security as a Service

Credit to Author: Trend Micro| Date: Wed, 17 Jul 2019 14:36:29 +0000

Cloud adoption continues to rise as organizations reduce their data center footprint, look to cloud native technologies to improve their application design and output, and strive to improve scalability and management of resources and systems. In a recent survey conducted by analyst firm ESG, 87% of respondents indicated that they currently run production applications and…

The post New Azure Marketplace Pay-As-You-Go Billing for Trend Micro Deep Security as a Service appeared first on .

Read more

This Week in Security News: Banking Malware and Phishing Campaigns

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 12 Jul 2019 15:17:02 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the banking malware Anubis that has been retooled for use in fresh attack waves. Also, read about a new phishing campaign that uses OneNote audio…

The post This Week in Security News: Banking Malware and Phishing Campaigns appeared first on .

Read more

This Week in Security News: Malvertising and Internet of Things Malware

Credit to Author: katerid| Date: Fri, 28 Jun 2019 14:24:11 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about a new Internet of Things malware that’s bricked thousands of devices. Also, read about a ransomware family that’s using malvertising to direct victims to a…

The post This Week in Security News: Malvertising and Internet of Things Malware appeared first on .

Read more