• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Macky Cruz (Technical Communications)

Ma. Christina Cruz

Technical Communications

Securing the Network Infrastructure: An Important Step in the Fight Against Targeted Attacks

  • Posted on:October 22, 2013
  • Posted in:Bad Sites
  • Posted by:
    Macky Cruz (Technical Communications)
0

The recent zero-day exploit targeting a use-after-free vulnerability in Internet Explorer highlights one thing: how important it is to use the least-privilege principle in assigning user profiles. Imagine if most user accounts are configured to have administrator rights or root access on their endpoint. (This is surprisingly frequent with older OSes, like Windows XP.) A simple…

Read More
Tags: administratorAPTnetwork administrationnetwork securityroottargeted attacks

Data Exfiltration in Targeted Attacks

  • Posted on:September 23, 2013
  • Posted in:Targeted Attacks
  • Posted by:
    Macky Cruz (Technical Communications)
0

Data exfiltration is the unauthorized transfer of sensitive information from a target’s network to a location which a threat actor controls. Because data routinely moves in and out of networked enterprises, data exfiltration can closely resemble normal network traffic, making detection of exfiltration attempts challenging for IT security groups. Figure 1. Targeted Attack Campaign Diagram…

Read More
Tags: APTdata exfiltrationdata leakEvilGrabsecurity breachtargeted attacks

Covert Arrivals: Email’s Role in APT Campaigns

  • Posted on:October 9, 2012
  • Posted in:Targeted Attacks
  • Posted by:
    Macky Cruz (Technical Communications)
0

Advanced persistent threats and targeted attacks often use socially engineered email as their point of entry into a target network.* Considering the volume of email traffic that an average business user sends (41) and receives (100) in a single working day and the relative ease by which social engineered emails are crafted and sent, enterprises…

Read More

[INFOGRAPHIC] APT Myths and Challenges

  • Posted on:May 24, 2012
  • Posted in:Exploits, Targeted Attacks, Vulnerabilities
  • Posted by:
    Macky Cruz (Technical Communications)
0

Do standard security solutions work against advanced persistent threats (APTs)? Are APTs crafted to extract specific files from an organization? Are data breaches caused by APTs? IT groups today face the challenge of protecting/shielding their networks against APTs—computer intrusions by threat actors that aggressively pursue and compromise targets. To help organizations formulate strategies against APTs,…

Read More

Cybercriminals Ride on the Back of Security Woes with FAKEAV

  • Posted on:April 22, 2010
  • Posted in:Bad Sites
  • Posted by:
    Macky Cruz (Technical Communications)
4

We regularly blog about how cybercriminals misuse newsworthy events in order to gain profit for themselves. In the past 24 hours, TrendLabsSM has tracked multiple FAKEAV attacks that try and trick users searching for help following the recent McAfee update 5958 incident.  This determination by cybercriminals to cause further problems and inconvenience to innocent end users and businesses…

Read More
Page 1 of 1112 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.