Exploiting Data Breaches By Michael Marriott, Digital Shadows security expert High profile data breaches are regularly in the news and, seemingly, businesses and are losing the battle to protect their intellectual property (IP), corporate, and customer data from the threats…
Trend Micro 1H Security Roundup Report Showcases Evolution of Ransomware and BEC Scams
Trend Micro 1H Security Roundup Report Showcases Evolution of Ransomware and BEC Scams SINGAPORE, August 24, 2016 – As Trend Micro predicted, 2016 has proven to be a year of online extortion through various malicious attack methods. Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader…
The Panamanian Shell Game: Cybercriminals With Offshore Bank Accounts?
The recent Panana Papers leak revealed high profile politicians, businessmen and other prominent individuals that were utilizing offshore organizations to cut off tax payment. This then led to the question – would cybercriminals too, utilize offshore organizations to facilitate their activities? According…
Verizon’s 2016 Data Breach Investigations Report finds cybercriminals are exploiting human nature
Verizon’s 2016 Data Breach Investigations Report finds cybercriminals are exploiting human nature April 27, New York – Cybercriminals are continuing to exploit human nature as they rely on familiar attack patterns such as phishing, and increase their reliance on ransomware,…
Microsoft Security Announcements Update
Here’s a quick recap of Microsoft’s recent security announcements, including those at the recently concluded RSA 2016, as well as news of the milestone opening of a Cybercrime Satellite Center in Korea – our 5th in Asia, and 7th globally. 1. Microsoft Launches…
Prototype Nation, The Chinese Cybercriminal Underground in 2015
By the end of 2013, the Chinese cybercrime underground was a very busy economy, with peddled wares that not only targeted PCs, but mobile devices as well—making it its most prolific segment. We also saw cybercriminals abusing popular Web services such…
Trend Micro Casts Light into the Shadows of the Deep Web
Approximately 400 times larger than the visible Web, the Deep Web is also home to many of the Internet’s illicit activities such as identity theft, doxing, firearm trading and employing contract killers. Some may be familiar with the “Dark Web” or “darknets”: but these are…