• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Underground Economy

Are IoT Threats Discussed In The Cybercriminal Underground?

  • Posted on:September 10, 2019
  • Posted in:Cybercrime, Internet of Things, Underground Economy
  • Posted by:
    Jon Clay (Global Threat Communications)
0

With IoT devices expected to reach tens of billions in the next few years, is it any wonder that cybercriminals are looking for ways to take advantage of this massive attack surface to generate illicit money? A number of Trend Micro researchers from around the globe decided to look into this and launched a research…

Read More
Tags: IoTUnderground Economy

Equifax Breach – an Example of Good Communications

  • Posted on:September 8, 2017
  • Posted in:Current News, Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

UPDATE: Please note we’ve provided a follow-up to this blog post here after more information regarding this breach was released.” Equifax announced a massive breach that could impact at least 143 million US consumers. That’s 44 percent of the US population. This breach will have a significant impact on a lot of people. Companies in…

Read More
Tags: Compliance & RegulationscybercrimeUnderground Economy

UNITEDRAKE Looms Large…Maybe

  • Posted on:September 7, 2017
  • Posted in:Current News
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

Responsible disclosure is a critical process in the security community. It’s the way for security researchers and vendors to work together in order to improve system security for users. We see the opposite of this process in the digital underground. Cybercriminals often sell exploits and malicious tools for profit. The ShadowBrokers—infamous for the leak of…

Read More
Tags: cybercrimeUnderground EconomyVulnerabilities

Everyone Is $$$ To Cybercriminals Using Ransomware

  • Posted on:January 12, 2017
  • Posted in:Ransomware, Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0
Everyone Is A Source Of Revenue For Criminals Using Ransomware

I used to love sitting on the floor and watching Saturday morning cartoons. One of my favorite gags was when a character got really, really hungry. In order to emphasize the point, everything and everyone around them turned to food. The newspaper stand owner became a large hand. The baby in a stroller was suddenly…

Read More
Tags: cybercrimeransomwareUnderground Economy

Russian cybercriminals turn Android malware into an industry

  • Posted on:August 15, 2013
  • Posted in:Cybercrime, Mobility, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

A select group of ten Russian gangs is molding Android SMS chargeware, the most common type of mobile phone malware, into a full-fledged business supported by a dedicated marketing team and an array of websites.

Read More
Tags: cybercrimeInternet ProtectionMobilityUnderground EconomyVulnerabilitiesweb threats

Wall Street may need to ramp up cyber security

  • Posted on:June 21, 2013
  • Posted in:Compliance & Regulations, Current News, Cybercrime, Privacy & Policy
  • Posted by:
    Trend Micro
0

High profile attacks have been gaining steam, with The Hill’s Brian Fitch wrote on the Congress Blog that there is an emerging need for more cyber security in Wall Street.

Read More
Tags: Compliance & RegulationsCurrent NewscybercrimePrivacy & PolicyUnderground Economy

FBI trying to train financial execs on cyber threats

  • Posted on:May 15, 2013
  • Posted in:Current News, Cybercrime, Privacy & Policy
  • Posted by:
    Trend Micro
0

The financial industry is and will continue to be one of the most lucrative for cybercriminals to attack. With the wealth of information, money and more at their fingertips, data security will be imperative for this industry to weather the storm that hackers bring.

Read More
Tags: Current NewscybercrimeData PrivacyUnderground Economy

Most external attacks from foreign lands

  • Posted on:May 2, 2013
  • Posted in:Current News, Cybercrime
  • Posted by:
    Trend Micro
0

One of the more interesting trends of data security is the amount of cyber attacks that have come from overseas to the U.S. in recent years. The Verizon 2013 Data Breach Investigations Report showed that China and Romania had the most cyber attacks last year, with Romanian attackers looking for financial data and Chinese hackers engaging in espionage.

Read More
Tags: Current NewscybercrimeUnderground Economyweb threats

Cybercrime syndicates mirroring their corporate targets

  • Posted on:January 2, 2013
  • Posted in:Cybercrime
  • Posted by:
    Trend Micro
0

Cybercriminal groups are actually organized along many of the same lines as the corporate entities they’re targeting.

Read More
Tags: Underground Economy

Swiss insider steals counterterrorism data

  • Posted on:December 10, 2012
  • Posted in:Cybercrime
  • Posted by:
    Trend Micro
0

Switzerland’s intelligence service recently revealed that classified counterterrorism data had been compromised as a result of an insider breach.

Read More
Tags: Underground Economy
Page 1 of 3123

Security Intelligence Blog

  • Waterbear is Back, Uses API Hooking to Evade Security Product Detection
  • December Patch Tuesday: Vulnerabilities in Windows components, RDP, and PowerPoint Get Fixes
  • Obfuscation Tools Found in the Capesand Exploit Kit Possibly Used in “KurdishCoder” Campaign

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Answering IoT Security Questions for CISOs
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • How To Be An Informed Skeptic About Security Predictions
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Trend Micro Selected as Launch Partner for AWS Ingress Routing Service and Stalkerware on the Rise
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • The Shared Responsibility Model
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • What Worries CISOs Most In 2019

Follow Us

Trend Micro In The News

  • Trend Micro Takes On Palo Alto Networks With Cloud Conformity Buy
  • Trend Micro Partners with Snyk to Fix Vulnerabilities for DevOps
  • Trend Micro Partners With Snyk To Advance DevSecOps
  • Hackers to stress-test Facebook Portal at hacking contest
  • NEW TECH: Trend Micro inserts 'X' factor into 'EDR' - endpoint detection response
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.