• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   cybercriminals

Informing Your Security Posture: How Cybercriminals Blend into the Background

  • Posted on:January 29, 2019
  • Posted in:Current News, Security
  • Posted by:
    Trend Micro
0

Maintaining protection over an enterprise’s critical data, systems and assets is a continual uphill battle. Not only are chances good that the business’s digital footprint is growing through new applications, but hackers are also constantly bolstering their capabilities to silently breach platforms and maintain a presence under the radar of the IT team. In the…

Read More
Tags: Advanced Persistent Threatscybercriminalsdigitally signed malwarefileless malware

This Week in Security News: Fake Apps & Malicious Bots

  • Posted on:November 9, 2018
  • Posted in:Current News, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how the adoption of mobile banking services has grown as an opportunity for scammers with fake banking apps. Also, see how Trickbot steals access from several…

Read More
Tags: Apache StrutscybercriminalsMovil SecureShellbotTrickbot

This Week in Security News: Tracking and Hacking

  • Posted on:September 7, 2018
  • Posted in:Current News
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.  This week, Google revealed a secret deal with Mastercard that allows it to track what users buy offline. Also, Senate and House representatives warn that regulation may be coming for…

Read More
Tags: BECcybercriminalsdevopsEquifax

BEC is Big Business for Hackers: What makes these attacks so hard to prevent?

  • Posted on:August 31, 2018
  • Posted in:Current News, Security
  • Posted by:
    Trend Micro
0

For years, one of the most lucrative ways for hackers to generate profits was through ransomware attacks. These instances involve the use of strong encryption to lock victims out of their files and data – attackers then sell the decryption key in exchange for an untraceable Bitcoin ransom payment. Now, however, another highly profitable attack…

Read More
Tags: BECBusiness Email Compromisecybercriminals

Cybercriminals Changing Tactics as Seen in First Half Report

  • Posted on:August 28, 2018
  • Posted in:Ransomware, Security, Targeted Attacks, Underground Economy
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Today, Trend Micro released its first half 2018 security roundup report in which we want to share the threat intelligence we discovered through the Trend Micro™ Smart Protection Network™ that allows us to identify the threats that have targeted our customer base. Below are some thoughts I’d like to share with you about these trends…

Read More
Tags: 2018 security roundup reportcryptojackingcryptominingcybercriminals

How Digital Extortion Impacts Today’s Enterprises

  • Posted on:August 22, 2018
  • Posted in:Security
  • Posted by:
    Trend Micro
0

By now, many enterprise decision-makers are familiar with the concept of digital extortion, particularly in the form of ransomware. These encryption-based attacks lock users out of their sensitive and valuable data, applications and operating systems. Attackers demand a ransom in the form of untraceable digital currency for the decryption key – which may or may…

Read More
Tags: cybercriminalsDigital extortionransomwareWannaCry

This Week in Security News: HR and Heritage Hacks

  • Posted on:June 8, 2018
  • Posted in:Current News
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, the details of 92 million accounts for MyHertitage were discovered on a private server outside of the company. Also, companies using services from PageUp are notifying employees that…

Read More
Tags: Business Email CompromisecybercriminalsGDPRHeritage Hacksrend Micro Internet Security

The New Mobile Threat Landscape, circa 2017 to 2018

  • Posted on:April 26, 2018
  • Posted in:Consumer, Mobile Security, Ransomware, Security
  • Posted by:
    Trend Micro
0
Is your phone infected?

Submitted by Ian Grutze If mobile threats diversified and expanded in 2016, they matured in 2017. Mobile ransomware continued to rear its head, burgeoning into the platform’s most prevalent threat. Simple screen lockers, for instance, evolved into file-encrypting malware, some of which even seemed to keep pace with their desktop counterparts in terms of malicious routines….

Read More
Tags: AndroidcryptocurrencycybercriminalsiOSMobile SecurityMobile Threat Landscaperansomware

Graffiti in the digital world: How hacktivists use defacement

  • Posted on:April 25, 2018
  • Posted in:Industry News, Security
  • Posted by:
    Trend Micro
0
Activism has found a new outlet in the digital realm.

The digital realm has become a critical space for individuals to express their opinions and further their causes.

Read More
Tags: cybercriminalshacktivistsweb defacement

How Hackers Recycle Top Threats

  • Posted on:February 5, 2018
  • Posted in:Industry News, Security
  • Posted by:
    Trend Micro
0
Just like white hat developers, hackers have been known to reuse and recycle code.

Hackers have recycled and repacked older exploits that worked well in the past to create a completely new threat.

Read More
Tags: cybercriminalsmalware
Page 1 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Digital Transformation is Growing but May Be Insecure for Many
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.