Are IoT Threats Discussed In The Cybercriminal Underground?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 10 Sep 2019 12:29:09 +0000

With IoT devices expected to reach tens of billions in the next few years, is it any wonder that cybercriminals are looking for ways to take advantage of this massive attack surface to generate illicit money? A number of Trend Micro researchers from around the globe decided to look into this and launched a research…

The post Are IoT Threats Discussed In The Cybercriminal Underground? appeared first on .

Read more

Cybercriminals Changing Tactics as Seen in First Half Report

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 28 Aug 2018 12:05:30 +0000

Today, Trend Micro released its first half 2018 security roundup report in which we want to share the threat intelligence we discovered through the Trend Micro™ Smart Protection Network™ that allows us to identify the threats that have targeted our customer base. Below are some thoughts I’d like to share with you about these trends…

The post Cybercriminals Changing Tactics as Seen in First Half Report appeared first on .

Read more

Bargains and brotherhood: The underground Digital Souks of the Middle East

Credit to Author: Rik Ferguson (VP, Security Research)| Date: Tue, 10 Oct 2017 12:00:29 +0000

The release of our report “Digital Souks: A glimpse into the Middle Eastern and North African underground” marks the 12th in our Cybercriminal Underground Economy Series (CUES). Having previously published several papers covering the Japanese, French, German, North American, Chinese, Russian and Brazilian undergrounds this is the first report of its kind focusing on this…

Read more

Grading our Predictions: See how we fared in 1H 2017

Credit to Author: Jon Clay| Date: Mon, 11 Sep 2017 12:00:36 +0000

In December of last year, we released eight predictions as to what we thought the 2017 cybersecurity landscape would hold. Although we’ve definitely observed new trends and attacks that we didn’t foresee, we’ve also seen several of our predictions play out as anticipated. With only three and a half months left in the year, we’re…

Read more

Grading our Predictions: See how we faired in 1H 2017

Credit to Author: Jon Clay| Date: Mon, 11 Sep 2017 12:00:36 +0000

In December of last year, we released eight predictions as to what we thought the 2017 cybersecurity landscape would hold. Although we’ve definitely observed new trends and attacks that we didn’t foresee, we’ve also seen several of our predictions play out as anticipated. With only three and a half months left in the year, we’re…

Read more

Grading our Predictions: See how we aired in 1H 2017

Credit to Author: Jon Clay| Date: Mon, 11 Sep 2017 12:00:36 +0000

In December of last year, we released eight predictions as to what we thought the 2017 cybersecurity landscape would hold. Although we’ve definitely observed new trends and attacks that we didn’t foresee, we’ve also seen several of our predictions play out as anticipated. With only three and a half months left in the year, we’re…

Read more

Equifax Breach – an Example of Good Communications

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Fri, 08 Sep 2017 15:50:25 +0000

Equifax announced a massive breach that could impact at least 143 million US consumers. That’s 44% of the US population. This breach will have a significant impact on a lot of people. Companies in the financial sector take cybersecurity very seriously. Part of that work is accepting the reality of today’s threat landscape. Security teams…

Read more

UNITEDRAKE Looms Large…Maybe

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Fri, 08 Sep 2017 03:32:04 +0000

Responsible disclosure is a critical process in the security community. It’s the way for security researchers and vendors to work together in order to improve system security for users. We see the opposite of this process in the digital underground. Cybercriminals often sell exploits and malicious tools for profit. The ShadowBrokers—infamous for the leak of…

Read more

Can YOU spot the fake?

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Tue, 13 Jun 2017 12:00:32 +0000

As we predicted in 2016, cyberpropaganda is a major growth area for cybercriminals. Per that prediction, “The rise in the Internet penetration has opened the opportunity for invested parties to use the Internet as a free-for-all tool to influence public opinion to go one way or another.” Today, we know this through Wikileaks and self-proclaimed…

Read more

Trend Micro and INTERPOL: Teaming Up Again to Fight Global Cybercrime

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Wed, 26 Apr 2017 18:51:15 +0000

At Trend Micro we have a long history of partnering with law enforcement whenever called upon. We believe that the skills and resources of the private sector can offer allow law enforcement to surge and scale on any particular threat. Combatting the threat posed by transnational cyber criminal groups is ultimately a shared responsibility and…

Read more

Pawn Storm: The Power of Social Engineering

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Tue, 25 Apr 2017 12:00:02 +0000

Anyone familiar with Pawn Storm (a.k.a. APT28, Fancy Bear, Strontium, etc.) is likely to associate the group with highly sophisticated targeted attacks that compromise government and media agencies around the world. In our latest report, researchers expose the true nature and scope of the cyber espionage group’s attacks and methodologies. Pawn Storm has managed to…

Read more