Are IoT Threats Discussed In The Cybercriminal Underground?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 10 Sep 2019 12:29:09 +0000

With IoT devices expected to reach tens of billions in the next few years, is it any wonder that cybercriminals are looking for ways to take advantage of this massive attack surface to generate illicit money? A number of Trend Micro researchers from around the globe decided to look into this and launched a research…

The post Are IoT Threats Discussed In The Cybercriminal Underground? appeared first on .

Read more

Cybercriminals Changing Tactics as Seen in First Half Report

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 28 Aug 2018 12:05:30 +0000

Today, Trend Micro released its first half 2018 security roundup report in which we want to share the threat intelligence we discovered through the Trend Micro™ Smart Protection Network™ that allows us to identify the threats that have targeted our customer base. Below are some thoughts I’d like to share with you about these trends…

The post Cybercriminals Changing Tactics as Seen in First Half Report appeared first on .

Read more

Bargains and brotherhood: The underground Digital Souks of the Middle East

Credit to Author: Rik Ferguson (VP, Security Research)| Date: Tue, 10 Oct 2017 12:00:29 +0000

The release of our report “Digital Souks: A glimpse into the Middle Eastern and North African underground” marks the 12th in our Cybercriminal Underground Economy Series (CUES). Having previously published several papers covering the Japanese, French, German, North American, Chinese, Russian and Brazilian undergrounds this is the first report of its kind focusing on this…

Read more

Grading our Predictions: See how we fared in 1H 2017

Credit to Author: Jon Clay| Date: Mon, 11 Sep 2017 12:00:36 +0000

In December of last year, we released eight predictions as to what we thought the 2017 cybersecurity landscape would hold. Although we’ve definitely observed new trends and attacks that we didn’t foresee, we’ve also seen several of our predictions play out as anticipated. With only three and a half months left in the year, we’re…

Read more

Grading our Predictions: See how we faired in 1H 2017

Credit to Author: Jon Clay| Date: Mon, 11 Sep 2017 12:00:36 +0000

In December of last year, we released eight predictions as to what we thought the 2017 cybersecurity landscape would hold. Although we’ve definitely observed new trends and attacks that we didn’t foresee, we’ve also seen several of our predictions play out as anticipated. With only three and a half months left in the year, we’re…

Read more

Grading our Predictions: See how we aired in 1H 2017

Credit to Author: Jon Clay| Date: Mon, 11 Sep 2017 12:00:36 +0000

In December of last year, we released eight predictions as to what we thought the 2017 cybersecurity landscape would hold. Although we’ve definitely observed new trends and attacks that we didn’t foresee, we’ve also seen several of our predictions play out as anticipated. With only three and a half months left in the year, we’re…

Read more

Equifax Breach – an Example of Good Communications

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Fri, 08 Sep 2017 15:50:25 +0000

Equifax announced a massive breach that could impact at least 143 million US consumers. That’s 44% of the US population. This breach will have a significant impact on a lot of people. Companies in the financial sector take cybersecurity very seriously. Part of that work is accepting the reality of today’s threat landscape. Security teams…

Read more

UNITEDRAKE Looms Large…Maybe

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Fri, 08 Sep 2017 03:32:04 +0000

Responsible disclosure is a critical process in the security community. It’s the way for security researchers and vendors to work together in order to improve system security for users. We see the opposite of this process in the digital underground. Cybercriminals often sell exploits and malicious tools for profit. The ShadowBrokers—infamous for the leak of…

Read more