• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   phishing

Hackers Expand Their Repertoire as Trend Micro Blocks 52 Billion Threats in 2019

  • Posted on:February 25, 2020
  • Posted in:Ransomware, Security
  • Posted by:
    Trend Micro
0

Variety is welcome in most walks of life, but not when it comes to the threat landscape. Yet that is unfortunately the reality facing modern cybersecurity professionals. As Trend Micro’s 2019  roundup report reveals, hackers have an unprecedented array of tools, techniques and procedures at their disposal today. With 52 billion unique threats detected by…

Read More
Tags: CISOphishingRoundup Report

Warning! Windows 10 Fake Update is Actually Ransomware

  • Posted on:November 21, 2019
  • Posted in:Uncategorized
  • Posted by:
    Trend Micro
0
Mobile devices could be the biggest ransomware threat.

Microsoft never sends updates via email. Many folks don’t know that, which is why a new ransomware campaign masquerading as a Windows 10 update is so pernicious. You may have already gotten a fake notice saying “Install Latest Microsoft Update Now!” Or “Critical Microsoft Windows Update!”, with the body of the message asking you to…

Read More
Tags: phishingransomwarewindows update hoaxes

This Week in Security News: Phishing Attacks and Ransomware

  • Posted on:April 26, 2019
  • Posted in:Current News, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0
week in security

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about schemes used in phishing and other email-based attacks. Also, learn how ransomware continues to make a significant impact in the threat landscape. Read on: New…

Read More
Tags: cyberattacksphishingransomware

A Look Back at the 2018 Security Landscape

  • Posted on:March 4, 2019
  • Posted in:Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Do you ever question the value of the mounds of data we all collect? We make a point to stop, analyze and share, especially because we know you might not have the time. So, I bring you our annual look back at the more interesting security events and trends seen last year. The report, Caught…

Read More
Tags: Business Email Compromise (BEC)phishingransomwareTrend Micro Zero Day Initiative (ZDI)WannaCry

Cyber Risk Index – A Guide for CISOs and IT Security

  • Posted on:February 12, 2019
  • Posted in:Business, Cyber Risk Index (CRI), Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Trend Micro has partnered with the Ponemon Institute to develop a new Cyber Risk Index (CRI), which is intended to help CISOs and their IT Security teams better understand the current cyber risk compared to similar businesses of their size and industry. The CRI is based on a survey conducted by Ponemon to more than…

Read More
Tags: ClickjackingCyber Risk Indexenterprise businessesphishing

Stop Office 365 Credential Theft with an Artificial Eye

  • Posted on:September 25, 2018
  • Posted in:Business, Microsoft, Security
  • Posted by:
    Chris Taylor
0

We all know that email remains by far the number one threat vector facing organizations today. Trend Micro blocked more than 20.4 billion threat in the first half of 2018 alone, nearly 83% of which were email borne. But there’s more: corporate email accounts have also become a key target for attackers in their own…

Read More
Tags: AIOffice 365phishing

This Week in Security News: Air Canada and Cryptojacking

  • Posted on:August 31, 2018
  • Posted in:Current News, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Air Canada reported a data breach that exposed passport details for more than 20,000 customers on their mobile app. Also, Trend Micro’s Midyear Security Roundup reported an…

Read More
Tags: Air Canadacryptojackingdevopsphishing

This Week in Security News: Facebook and Feds

  • Posted on:August 3, 2018
  • Posted in:Current News
  • Posted by:
    Trend Micro
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Facebook’s chief security officer resigned as Facebook steps up its cybersecurity efforts. Also, Feds indicted three Ukrainians charged with stealing data on 15 million payment cards from…

Read More
Tags: cyberthreatsfacebookMachine LearningphishingRedditUkrain

Phishing, Part 2: Staying Safe

  • Posted on:August 2, 2018
  • Posted in:Consumer, Security
  • Posted by:
    Brook Stein, Product Management Director
0

As mentioned in Phishing Part 1: On the Lookout, phishing attacks have been around for years, but today’s cybercriminals are adept at using them in an ever-increasing variety of ways to get what they want. According to the most recent FBI figures, phishing and its variants was the third most popular cybercrime type in 2017,…

Read More
Tags: fraudshoaxingmalicious spamphishingphishing protection.spoofing

Phishing, Part 1: On the Lookout

  • Posted on:July 31, 2018
  • Posted in:Consumer, Security
  • Posted by:
    Brook Stein, Product Management Director
0

Cybersecurity has gone mainstream, thanks in part to the hacking of the 2016 Presidential election. But how many of us know how the attackers in this case actually achieved their ends? The truth is, that one of the oldest, but most effective weapons in the cybercriminal’s arsenal, undoubtedly used in those attacks, is a threat…

Read More
Tags: fraudshoaxingmalicious spamphishingphishing protection.spoofing
Page 1 of 212

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Offerings Are FedRAMP Authorized and Available on AWS
  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRN® Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.