Incident Response In The Public Eye

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Mon, 31 Dec 2018 17:00:44 +0000

Cyberattacks happen constantly. Every day organizations are attackers online whether they realize it or not. Most of these attacks are passing affairs. The mere fact that systems are on to the internet makes them a target of opportunity. For the most part, these attacks are non-events. Security software, bugs in attack code, and updated applications…

The post Incident Response In The Public Eye appeared first on .

Read more

This Week in Security News: Deep Dives and NASA Data

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 21 Dec 2018 17:19:23 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the span of a NASA hack that leaked data for current and former employees. Also, Trend Micro dives deep into the underground software business and…

The post This Week in Security News: Deep Dives and NASA Data appeared first on .

Read more

This Week in Security News: Security Predictions and Malware Attacks

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 14 Dec 2018 18:20:36 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the span of categories for Trend Micro’s 2019 Security Predictions. Also, learn about a new exploit kit that targets home or small office routers which attacks…

The post This Week in Security News: Security Predictions and Malware Attacks appeared first on .

Read more

What Happens When Victims Pay Ransomware Attackers?

Credit to Author: Trend Micro| Date: Mon, 10 Dec 2018 15:00:16 +0000

For many hackers around the globe, ransomware infections have become a lucrative business. Although these types of malware samples have been around for years now, they continue to spur success – and high monetary profits – for attackers. In fact, according to a statement from U.S. Deputy Attorney General Rod Rosenstein during the 2017 Cambridge…

The post What Happens When Victims Pay Ransomware Attackers? appeared first on .

Read more

This Week in Security News: Security and Privacy Issues

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 07 Dec 2018 15:03:46 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, understand how Trend Micro™ Deep Security™ service will be integrating with AWS Security Hub. Also, learn how to prevent risks and secure machine-to-machine communications over Message Queuing Telemetry Transport and…

The post This Week in Security News: Security and Privacy Issues appeared first on .

Read more

This Week in Security News: Ethics and Law in the Dark Web

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 30 Nov 2018 15:49:23 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.  This week, learn how Trend Micro software can aid in safely securing containers on the AWS Cloud. Also, how the dark web has become a new advertising medium for…

The post This Week in Security News: Ethics and Law in the Dark Web appeared first on .

Read more

Today’s Data Breach Environment: An Overview

Credit to Author: Trend Micro| Date: Wed, 28 Nov 2018 19:04:36 +0000

By now, companies and consumers alike are well aware of the threat of a data breach. Large and small businesses across every sector have been targeted, and many customers are now familiar with the notification that their username, password or other details might have been compromised. The unfortunate fact is that, despite efforts on the…

The post Today’s Data Breach Environment: An Overview appeared first on .

Read more

This Week in Security News: Holiday Cybercriminals & Cryptomining Malware

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 16 Nov 2018 15:21:25 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn the common threats and the best practices for defending against cybercriminals during November’s online shopping season. Also, see the different cryptomining malware affecting Linux systems and…

The post This Week in Security News: Holiday Cybercriminals & Cryptomining Malware appeared first on .

Read more