• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Hacks

Picking Apart a Decade of Breaches: The Top 5 Breached Industries

  • Posted on:September 30, 2015
  • Posted in:Data Privacy, Hacks, Security
  • Posted by:Christopher Budd (Global Threat Communications)
0

Data breaches seem to come so fast these days that sometimes it’s important for us as an industry to take a step back and catch our breath. It’s hard to believe that we’ve already been recording these incidents for a decade. So with that in mind, Trend Micro decided to take 10 years’ worth of…

Read More

Trend Micro’s Data Breach Report: “Follow the Data: Dissecting Data Breaches and Debunking Myths”

  • Posted on:September 22, 2015
  • Posted in:Hacks, Internet Safety, Security, Vulnerabilities & Exploits
  • Posted by:Christopher Budd (Global Threat Communications)
1

Data breaches are in the news all the time these days. Whether it’s the loss of credit and debit card information from a retailer like Target or personal and health care information from a health insurance company, there’s a steady drumbeat of stories about data being lost to attackers. But the stories don’t tell you…

Read More

The Grave Consequences of Geopolitical Hacking

  • Posted on:September 9, 2015
  • Posted in:Hacks, Security, Targeted Attacks
  • Posted by:Tom Kellermann
0
Critical infrastructure attacks are one of the pressing cyber concerns this year.

On the tragic week of September 11th I must remind you that the historic lesson of September 11th, is that non-state actors will use technology to attack critical infrastructures.  2015 has become a dark year wherein more cyberweapons have been distributed to actors who are not solely operating as criminals but also are paying homage…

Read More

A Cyberespionage Campaign against the Middle East

  • Posted on:September 1, 2015
  • Posted in:Cybercrime, Hacks, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Trend Micro threat research today released a new report that details out the activities of a group of hackers we call Rocket Kitten and who have been active in a cyberespionage campaign for several years now. We released a previous report on this group, but since then some new activities have been uncovered with the help…

Read More

Crypto-Ransomware Attacks: The New Form of Kidnapping

  • Posted on:August 6, 2015
  • Posted in:Cybercrime, Hacks, Security
  • Posted by:
    David Dunkel
2

The evolution of crime continues to push itself into the cyber world. Physical criminal operations are now learning to walk again as our generation continues to get its feet wet in the digital age. The low risk, high reward incentive involved with cybercrime opens the flood gates for criminal pioneers to evolve their financially motivated…

Read More

Advising You about Malvertising

  • Posted on:August 5, 2015
  • Posted in:Hacks, Security, Vulnerabilities
  • Posted by:
    Jon Clay (Global Threat Communications)
0

This week we learned of a concerted cybercriminal effort to subvert the Yahoo ad network, which could have affected the 6.9 billion monthly visitors to their site. The threat actors behind this attack utilized a few threats we’ve seen recently, such as malvertisements and exploit kits. Malvertisements are malicious ads designed and placed by cybercriminals…

Read More

Is Your Car Connected or Protected?

  • Posted on:August 4, 2015
  • Posted in:Hacks, Internet of Everything, Security, Vulnerabilities & Exploits
  • Posted by:
    Cara West-Wainwright
0

Could you have imagined five years ago that the car you’re driving would have greater computing power than the Apollo 11 that landed on the moon? And could you have imagined that those same cars would be manufactured with state-of-the-art roll bars, airbags and anti-lock brakes to prevent accident and injury, but not sufficient cyber…

Read More

Revealing Widespread Gas Station Cyber Attacks at Black Hat

  • Posted on:July 31, 2015
  • Posted in:Hacks, Security, Web Security
  • Posted by:
    Cara West-Wainwright
1

At Trend Micro it’s always been our job to work out where the next threat is coming from, so we can offer the best protection possible to our customers. Sometimes people listen to us at shows and say: “Seriously? That’s never happened to us.” But that’s the point. It hasn’t … yet. Who would have…

Read More

Impact Team to Ashley Madison – Shut down or Else!

  • Posted on:July 20, 2015
  • Posted in:Data Privacy, Hacks, Security
  • Posted by:Christopher Budd (Global Threat Communications)
0

Brian Krebs reports that Ashley Madison, a self-proclaimed site for extra-marital affairs, has been successfully breached. The attackers, a group calling themselves the “Impact Team,” claim they’ve stolen a significant trove of internal information that includes personal details on some, if not all, of the site’s 37 million users. Avid Life Media (ALM), who owns…

Read More

Pawn Storm: First Java Zero-Day Attack in Two Years Targets NATO & US Defense Organizations

  • Posted on:July 12, 2015
  • Posted in:Hacks, Security, Vulnerabilities
  • Posted by:Christopher Budd (Global Threat Communications)
15

Overnight, Trend Micro’s research teams identified a new attack in the ongoing Pawn Storm campaign that is focused on high-profile, sensitive targets. The Trend Micro™ Smart Protection Network™ has enabled us to identify email messages targeting a NATO member as well as a US defense organization. This latest Pawn Storm attack is also notable because…

Read More
Page 2 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Trend Micro Asks Students How Their Relationship to the Internet Has Changed During COVID-19
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, MĂŠxico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, EspaĂąa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.