• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   ransomware

This Week in Security News: Security Predictions and Malware Attacks

  • Posted on:December 14, 2018
  • Posted in:Current News, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the span of categories for Trend Micro’s 2019 Security Predictions. Also, learn about a new exploit kit that targets home or small office routers which attacks…

Read More
Tags: Elasticsearchransomwaresecurity predictionsVulnerabilities

What Happens When Victims Pay Ransomware Attackers?

  • Posted on:December 10, 2018
  • Posted in:Current News, Security
  • Posted by:
    Trend Micro
0

For many hackers around the globe, ransomware infections have become a lucrative business. Although these types of malware samples have been around for years now, they continue to spur success – and high monetary profits – for attackers. In fact, according to a statement from U.S. Deputy Attorney General Rod Rosenstein during the 2017 Cambridge…

Read More
Tags: decryptiondecryptor toolEncryptionfile decryptorransomware

Today’s Data Breach Environment: An Overview

  • Posted on:November 28, 2018
  • Posted in:Current News, Security
  • Posted by:
    Trend Micro
0

By now, companies and consumers alike are well aware of the threat of a data breach. Large and small businesses across every sector have been targeted, and many customers are now familiar with the notification that their username, password or other details might have been compromised. The unfortunate fact is that, despite efforts on the…

Read More
Tags: Business Email Compromisedata breachmalwaremega breachransomware

Which Threats had the Most Impact During the First Half of 2018?

  • Posted on:November 6, 2018
  • Posted in:Current News, Security
  • Posted by:
    Trend Micro
0

One of the best ways for organizations to shore up their data security efforts and work toward more proactive protection is by examining trends within the threat environment. Taking a look at the strategies for attack, infiltration and infection currently being utilized by hackers can point toward the types of security issues that will continue…

Read More
Tags: cryptocurrency minerCryptocurrency miningdata breachdata protectiondata securitymega breachransomwareVulnerabilities

This Week in Security News: Spam Campaigns and Vulnerable Infrastructures

  • Posted on:November 2, 2018
  • Posted in:Current News, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, see how cybercriminals have learned to become more creative with malware through spam campaigns. Also, understand why securing energy and water should remain top priority in integration…

Read More
Tags: cybersecurityFreedom HousePerl ShellbotransomwareT2 security chip

Ransomware Threat Continues: How Infections Take Place

  • Posted on:October 30, 2018
  • Posted in:Current News, Security
  • Posted by:
    Trend Micro
0

If cybersecurity consultants and IT admins have learned anything of the current threat environment, it’s that ransomware will continue to be a pervasive and dangerous threat to individual users, enterprises and organizations at large. When they first emerged, these infections were unlike anything that tech experts had ever seen, combining strong encryption and blackmail tactics…

Read More
Tags: Encryptionransomwareransomware infectionransomware protection

How Digital Extortion Impacts Today’s Enterprises

  • Posted on:August 22, 2018
  • Posted in:Security
  • Posted by:
    Trend Micro
0

By now, many enterprise decision-makers are familiar with the concept of digital extortion, particularly in the form of ransomware. These encryption-based attacks lock users out of their sensitive and valuable data, applications and operating systems. Attackers demand a ransom in the form of untraceable digital currency for the decryption key – which may or may…

Read More
Tags: cybercriminalsDigital extortionransomwareWannaCry

Which specific malware trends should American businesses be prepared for?

  • Posted on:July 27, 2018
  • Posted in:Current News, Security
  • Posted by:
    Trend Micro
0

In 2017, more than 700 million malware specimens were discovered. In this type of environment, it can be a considerable challenge for enterprises to keep up with the ever-changing threat landscape and ensure their internal protections are sufficient for safeguarding their most critical IT assets and data. After all, with each new day comes a sophisticated…

Read More
Tags: cryptocurrency minersCryptocurrency mininginformation stealersmalwareransomware

The New Mobile Threat Landscape, circa 2017 to 2018

  • Posted on:April 26, 2018
  • Posted in:Consumer, Mobile Security, Ransomware, Security
  • Posted by:
    Trend Micro
0
Is your phone infected?

Submitted by Ian Grutze If mobile threats diversified and expanded in 2016, they matured in 2017. Mobile ransomware continued to rear its head, burgeoning into the platform’s most prevalent threat. Simple screen lockers, for instance, evolved into file-encrypting malware, some of which even seemed to keep pace with their desktop counterparts in terms of malicious routines….

Read More
Tags: AndroidcryptocurrencycybercriminalsiOSMobile SecurityMobile Threat Landscaperansomware

This Week in Security News: Hacks and Attacks

  • Posted on:April 6, 2018
  • Posted in:Current News
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, a Forbes report revealed the cybersecurity concerns among everyday consumers and Lord & Taylor and Saks suffered a massive data breach. Read on to learn more. Tech…

Read More
Tags: compliancecybersecurityGDPRHITRUSTLord & Taylorransomware
Page 2 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRN® Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Nuffield Health Depends on Managed XDR with Trend Micro Vision One
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.