TrendMicro

SecurityTrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 24, 2017

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 28 Apr 2017 12:26:11 +0000

There was a time when a person’s motivation to hack something was for financial reasons or for street cred. But now we’re seeing organizations that have other motivations. Pawn Storm is a cyber-espionage organization whose motives include foreign and domestic espionage, and influence on geopolitics. Trend Micro has been following the organization for quite some…

Read More
SecurityTrendMicro

Trend Micro and INTERPOL: Teaming Up Again to Fight Global Cybercrime

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Wed, 26 Apr 2017 18:51:15 +0000

At Trend Micro we have a long history of partnering with law enforcement whenever called upon. We believe that the skills and resources of the private sector can offer allow law enforcement to surge and scale on any particular threat. Combatting the threat posed by transnational cyber criminal groups is ultimately a shared responsibility and…

Read More
SecurityTrendMicro

Linux is secure…right?

Credit to Author: Lauren Newby| Date: Tue, 25 Apr 2017 18:45:13 +0000

“There are no threats for Linux servers. Aren’t they built to be secure?” “Linux servers are so secure and hardened, why do we need security controls on those?” “I do understand there are threats out there but I am not aware of any major attacks on Linux servers” If you find yourself nodding in agreement,…

Read More
SecurityTrendMicro

A Storm’s a Coming: How businesses can defend against threat actor groups like Pawn Storm

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Tue, 25 Apr 2017 14:00:47 +0000

It's critical to hire a CISO that has experience and can lead a team.Pawn Storm (aka Sednit5, Fancy Bear, APT28, Sofacy and STRONTIUM8) might sound like Instagram accounts, top-secret spy programs or recently passed legislation, but in reality they are all different names for the same successful cyber espionage group (or threat actor group). These actors often use multi-angle bombardment attacks on the same target, implementing multiple methods…

Read More
SecurityTrendMicro

Pawn Storm: The Power of Social Engineering

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Tue, 25 Apr 2017 12:00:02 +0000

Anyone familiar with Pawn Storm (a.k.a. APT28, Fancy Bear, Strontium, etc.) is likely to associate the group with highly sophisticated targeted attacks that compromise government and media agencies around the world. In our latest report, researchers expose the true nature and scope of the cyber espionage group’s attacks and methodologies. Pawn Storm has managed to…

Read More