Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the span of a NASA hack that leaked data for current and former employees. Also, Trend Micro dives deep into the underground software business and its effect on the cybercrime industry.
Researchers at Trend Micro have identified a Twitter account that’s hiding messages inside images — a technique referred to as steganography.
Latin America sees an average 3,7 million malware attacks a day and about 1 billion occurrences a year.
Data from Trend Micro’s managed detection and response shows how the cybersecurity policies of organizations are reflected by the threats they most often face.
Hackers from around the world battled it out in Tokyo during a Capture the Flag event hosted by Trend Micro.
Global losses to BEC have exceeded US$12 billion. To keep abreast of the scammer landscape, we look back on some of the incidents and trends that made BEC a headline staple this year.
Researchers at Trend Micro have singled out HolaVPN, a free “community VPN,” for using customer computers and devices as exit points for spam, phishing messages and worse.
How should IIoT security be implemented? Identifying the building blocks of IIoT security is key to answering this question.
For years, Facebook gave tech giants more intrusive access to users’ personal data than it has disclosed, effectively exempting those business partners from its usual privacy rules.
The modern cybercrime landscape has changed much from around a decade ago, when most criminals either built their own toolsets or hired other developers to create them.
Hackers into one of NASA’s servers in October had access to the personal data of former and current employees.
Did the news of the latest Facebook scandal surprised you? Why or why not? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: @JonLClay.