• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Targeted Attacks

The Life Cycle of a Compromised (Cloud) Server

  • Posted on:September 1, 2020
  • Posted in:Cloud, Cloud Security, Cybercrime, Network, Ransomware, Security, Targeted Attacks
  • Posted by:
    Bob McArdle
0

Trend Micro Research has developed a go-to resource for all things related to cybercriminal underground hosting and infrastructure. Today we released the second in this three-part series of reports which detail the what, how, and why of cybercriminal hosting (see the first part here). As part of this report, we dive into the common life…

Read More
Tags: Cloud SecurityCompromised ServercryptominingCyprocurrency MiningLifecycleTargeted ransomware

Threat Intelligence, the Dark Web and Information sharing: Supporting improved protection

  • Posted on:November 1, 2018
  • Posted in:Security, Targeted Attacks, Underground Economy
  • Posted by:
    Trend Micro
0

There are numerous different elements and obstacles that contribute to the challenges of data protection in the current threat environment. However, a leading issue is ensuring protection against the latest, emerging attack styles and breach strategies. After all, how can an organization ensure the security of its most critical information and assets if they don’t…

Read More
Tags: Dark Webmalwareunderground

Cybercriminals Changing Tactics as Seen in First Half Report

  • Posted on:August 28, 2018
  • Posted in:Ransomware, Security, Targeted Attacks, Underground Economy
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Today, Trend Micro released its first half 2018 security roundup report in which we want to share the threat intelligence we discovered through the Trend Micro™ Smart Protection Network™ that allows us to identify the threats that have targeted our customer base. Below are some thoughts I’d like to share with you about these trends…

Read More
Tags: 2018 security roundup reportcryptojackingcryptominingcybercriminals

2018’s Biggest Attacks Will Stem from Known Vulnerabilities

  • Posted on:December 5, 2017
  • Posted in:Security, Targeted Attacks, Vulnerabilities & Exploits
  • Posted by:
    Martin Roesler (Director, Threat Research)
0

Trend Micro just released its annual predictions report for next year. In this, we outline 8 ways the threat landscape is expected to evolve in 2018. While the predictions touch on a wide range of issues – from IoT to cyberpropaganda – the underlying theme is this, 2018’s biggest attacks will stem from known vulnerabilities….

Read More

When Phishing Starts from the Inside

  • Posted on:October 5, 2017
  • Posted in:Business, MITRE, Security, Targeted Attacks
  • Posted by:
    Chris Taylor
0
Phishing is one of the greatest and most time consuming challenge security professionals face today.

A growing concern of security professionals is internal phishing attacks – phishing emails sent from one trusted user to another of the same organization. Internal phishing emails are used in multi-stage attacks in which an email account is owned either by controlling the users device with previously installed malware or by compromising the account credentials…

Read More
Tags: phishing

Pawn Storm – A Look Into this Cyberespionage Actor Group

  • Posted on:May 8, 2017
  • Posted in:Cybercrime, Hacks, Security, Targeted Attacks
  • Posted by:
    Jon Clay (Global Threat Communications)
0

In April 2017 my monthly threat webinar focused on a cyberespionage group our Forward-Looking Threat Researcher, Feike Hacquebord, has been following for many years and recently published a report into the most recent two years of activities. In this post I want to focus on their tools and tactics versus who they target since this…

Read More

Leaking Pagers – How Insecure Tech Can Leave Your Organization Hopelessly Exposed

  • Posted on:December 13, 2016
  • Posted in:Critical Infrastructure, Healthcare, Security, Targeted Attacks
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0

In the third and final installment of the “Leaking Beeps” series, Trend Micro’s Forward-Looking Threat Research team reveal the risks posed by pager technology used in IT systems throughout various industries, including, healthcare, ICS, universities and enterprises. Once again, we were surprised by the vast amount of unencrypted data cybercriminals are able to access by…

Read More

Announcing Advanced Threat Protection: Some announcements are better than others

  • Posted on:July 19, 2016
  • Posted in:Security, Targeted Attacks, Vulnerabilities
  • Posted by:
    TJ Alldridge
0
Details of 30,000 federal employees was leaked recently after cyber criminals breached a Department of Homeland Security database.

I have been going to the same summer camp every year since I was about 5. Back then it was 4 single moms looking for a place to bring their kids for some outdoors fun and a hope that the kids would take part in an activity long enough to get through a chapter in…

Read More

No One-Trick Pony Please

  • Posted on:December 18, 2015
  • Posted in:Security, Targeted Attacks, Vulnerabilities
  • Posted by:
    Bob Corson
1

On December 8th, 2015 the International Computer Security Association (ICSA) announced the results of the advanced threat defense (ATD) solution certification testing. Given Trend Micro’s track record of active participation in industry tests such as, NSS Labs Breach Detection testing, the results of the ICSA test further demonstrates the detection efficacy of Deep Discovery. This…

Read More

Stand Up and Be Counted – Public/Private Collaboration for Cybersecurity

  • Posted on:November 23, 2015
  • Posted in:Cybercrime, Security, Targeted Attacks
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0

Last Friday, I had the opportunity to join CNBC’s popular morning show, Squawk Box to discuss cyber threats posed by criminal networks and terrorist organizations. For both groups, physical and cyber safe havens are critical for their success. These entities need clandestine platforms to serve as a base of operations to communicate, finance and plan…

Read More
Page 1 of 212

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Offerings Are FedRAMP Authorized and Available on AWS
  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRN® Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.