• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Hacks

Cybersecurity Leaders Are Talking A Lot About Counterfeit Devices

  • Posted on:May 7, 2019
  • Posted in:Hacks, Healthcare, Internet of Things, Security
  • Posted by:
    Greg Young (Vice President for Cybersecurity)
0

Malice Vs Greed Most discussion about security in the supply chain has been focused on detecting tampering, or preventing backdoors or sneaky things being inserted into components and software. There’s another aspect emerging and will dwarf the tampering: devices that are counterfeited for profit indirectly causing security problems. Counterfeit devices are ones that either by…

Read More
Tags: Counterfeit DevicescybersecurityIoT

Trend Micro Capture the Flag: Train security professionals – Close the skills gap

  • Posted on:November 13, 2017
  • Posted in:Hacks, Security, Trend Spotlight
  • Posted by:
    Trend Micro
0

Businesses today face a security challenge: Protecting their systems and data is vital, but there aren’t enough qualified employees who can successfully make that happen. Similarly, young cybersecurity professionals need to overcome the gap between what is learned in a classroom and the practical experience required to protect real, critical business data. Trend Micro’s annual…

Read More

Pawn Storm – A Look Into this Cyberespionage Actor Group

  • Posted on:May 8, 2017
  • Posted in:Cybercrime, Hacks, Security, Targeted Attacks
  • Posted by:
    Jon Clay (Global Threat Communications)
0

In April 2017 my monthly threat webinar focused on a cyberespionage group our Forward-Looking Threat Researcher, Feike Hacquebord, has been following for many years and recently published a report into the most recent two years of activities. In this post I want to focus on their tools and tactics versus who they target since this…

Read More

Think changing your Yahoo password is enough? Think again…

  • Posted on:September 29, 2016
  • Posted in:Hacks, Internet Safety, Security, Vulnerabilities & Exploits
  • Posted by:
    Dustin Childs (Zero Day Initiative Communications)
0

With the recent announcement of more than 500 million accounts impacted by a security breach, many Yahoo users have been changing their passwords. After all, that’s the official guidance. However, as ZDI’s Simon Zuckerbraun points out, a new password isn’t enough. If you have a Yahoo account, chances are you’ve seen a notification that your account…

Read More

Yahoo Breach: It’s Time to Keep Those Passwords Safe

  • Posted on:September 28, 2016
  • Posted in:Consumer, Hacks, Privacy, Security
  • Posted by:
    Shannon McCarty-Caplan
0
Two-factor authentication has come under fire from the NIST recently.

If you live on Planet Earth right now, chances are you have heard of the Yahoo mega data breach. The internet pioneer admitted last week that highly sensitive information on 500 million account holders was stolen from its network a two years ago, but only just discovered. That may have given the bad guys a…

Read More

The Latest New York Times Attack: Are the Russians Coming? Does it Matter?

  • Posted on:August 25, 2016
  • Posted in:Cybercrime, Hacks, Security
  • Posted by:Christopher Budd (Global Threat Communications)
0

Three and a half years ago, The New York Times announced that their network had been breached in a targeted attack. Today, CNN is reporting another breach of The New York Times, among other press outlets. CNN’s report says that investigators are attributing these attacks to Russian sources, possibly in conjunction with the recent attacks…

Read More

What Can Defenders Learn From VTech?

  • Posted on:December 2, 2015
  • Posted in:Cloud Security, Cybercrime, Hacks
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0
A knight's shield standing upright (no background) in a sketched style

The breach of VTech by an unknown cyber-criminal continues to escalate. After initial reports of a breach exposing personally identifiable data of it’s customers (despite VTech’s statement otherwise), the hacker released a limited set of personal messages and photos from VTech customers to prove a near-complete compromise. It’s been a bad week for VTech. Make no mistake, VTech…

Read More
Tags: data securityincident response

Accelerated Deprecation Date for SHA-1 Certificates?

  • Posted on:November 10, 2015
  • Posted in:Critical Infrastructure, Encryption, Hacks, Microsoft, Security, Web Security
  • Posted by:
    Chris Bailey (General Manager, Trend Micro SSL)
0

There is a likely acceleration date which may require you to switch all your SHA-1 certificates to SHA-2 certificates by June 1, 2016, instead of the previous deadline of December 31, 2016. In 2013, Microsoft announced that SHA-1 certificates will have significant security problems in the following years, and therefore cannot be issued after Jan 1,…

Read More
Tags: SHA-1SHA-2SSLTLSVulnerabilities

Email Havoc – CIA Director Account Targeted by Hacktivist

  • Posted on:October 20, 2015
  • Posted in:Hacks, Security
  • Posted by:Christopher Budd (Global Threat Communications)
0

Email security for people in sensitive positions is a growing topic of concern. There is of course the ongoing discussion around the security of former Secretary of State Hillary Clinton’s “homebrew” email server, and now news that the personal email accounts of CIA Director John Brennan and Department of Homeland Security Secretary Jeh Johnson may…

Read More

Debunking Breach Myths: Who is Stealing Your Data?

  • Posted on:October 1, 2015
  • Posted in:Data Privacy, Hacks, Security
  • Posted by:Christopher Budd (Global Threat Communications)
1

One the one hand, it’s always important to maintain a healthy skepticism when reading about the latest data breaches. Major incidents might grab the headlines, but they don’t always tell the whole story. On the other hand, cold hard facts collected over a period of 10 years offer a great opportunity for us to analyze…

Read More
Page 1 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Cloud-based Email Threats Capitalized on Chaos of COVID-19
  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, MĂŠxico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, EspaĂąa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.