• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Ransomware

Countering Ransomware and BEC: Time to Re-evaluate Your Email Security

  • Posted on:June 14, 2016
  • Posted in:Business, Ransomware, Security
  • Posted by:Christopher Budd (Global Threat Communications)
0

Right now two of the biggest threats that organization are facing are Ransomware and Business Email Compromise (BEC). Ransomware has been in the news a lot. And it’s understandable why: when cybercrime activity impacts hospitals and their ability to give care, that’s an example of cybercrime having real-world consequences. But as we outline in our…

Read More

Ransomware 101: What Organizations Need to Know

  • Posted on:June 8, 2016
  • Posted in:Ransomware, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Pick up any newspaper or log-on to your favorite tech news site today and you’re likely to come across a story about ransomware. There aren’t many CISOs or IT managers left in the US who haven’t either become a victim or know an organization that has. Trend Micro alone has blocked over 100 million such threats…

Read More

Part 6: Visibility is Power – Fighting Back Against Ransomware

  • Posted on:June 2, 2016
  • Posted in:Ransomware, Security
  • Posted by:
    Wendy Moore
0

As the final installment in our 6-part series on the need for multiple layers of protection against ransomware, let’s take a look at how centralized ransomware visibility ties these layers together and helps you improve your security posture. In the world of cyber security knowledge is power. One key element is threat intelligence, which provides us…

Read More

Understanding Ransomware and Exploring Solutions

  • Posted on:June 1, 2016
  • Posted in:Ransomware, Security
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0
Ransomware strikes Macs for the first time.

Cyber extortion attacks on enterprises have grown exponentially in the last year and the ransomware families behind them have grown at a similar pace. We have blocked more than 100 million since October 2015. New families alone have grown 100% in the first six months of 2016, and we have detected and blocked more than 50 new…

Read More

Part 5: Time to Shield Your Servers Against a New Breed of Ransomware

  • Posted on:May 24, 2016
  • Posted in:Ransomware, Security
  • Posted by:
    Wendy Moore
0

Ransomware is the scourge of the modern IT security team. If allowed to spread through your IT environment it could shut down the organization, denying access to mission critical data for potentially days, or even indefinitely. The result? The disruption of service delivery, lost productivity and a hefty hit to reputation and profits. Some believe the…

Read More

Part 4: Network Defense: Why Visibility is Key to Rooting Out Ransomware

  • Posted on:May 23, 2016
  • Posted in:Ransomware, Security
  • Posted by:
    Wendy Moore
0
Hacking communities are actually quite distinct in their cultures.

Most organizations work hard to invest in reducing operating costs and improving the overall efficiency of their networks. But often there are unforeseen risks and costs are associated with the infrastructure connecting servers and hosts internally and out to third parties and devices. Without “agnostic visibility” into all traffic and network activity, hackers will always…

Read More

Part 3: Lock Down the Endpoint as Part of Your Layered Defense Against Ransomware

  • Posted on:May 20, 2016
  • Posted in:Ransomware, Security, Web Threats
  • Posted by:
    Wendy Moore
0
Email may not be as secure as many people might think.

There are few reliable statistics indicating the exact size of the global ransomware epidemic. But according to the FBI, just one variant – CryptoWall – netted its authors over $18 million in just over a year. It’s pretty clear that this is the black hats’ new favorite way to extort money from their victims. That’s why we’ve…

Read More

Part 2: Email and Web Gateway – Your First Line of Defense Against Ransomware

  • Posted on:May 19, 2016
  • Posted in:Ransomware, Security, Web Threats
  • Posted by:
    Wendy Moore
0

Ransomware is fast becoming the scourge of IT departments all over the world. It has risen over the past 12-24 months from a minor nuisance to a major threat – causing business disruption and damaging the brand and reputation of countless organizations. There’s no silver bullet for stopping this new malware threat. But take the time…

Read More

Part 1: Combatting the Ransomware Epidemic Requires Layered Security

  • Posted on:May 18, 2016
  • Posted in:Business, Current News, Ransomware, Security
  • Posted by:
    Leah MacMillan
0
With 2015 coming to a close, now is the time to take a look at predictions for next year.

Things move pretty fast in the cyber security space. A year ago, there were many CISOs and security managers who might not have even heard of ransomware. That’s certainly not true today. It has fast become one of the biggest concerns for anyone working in IT security, and rightly so. The cyber extortionists behind this rapidly…

Read More
Page 6 of 6 « ‹ 56

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Trend Micro Asks Students How Their Relationship to the Internet Has Changed During COVID-19
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.