CopyKittens Exposed by ClearSky and Trend Micro

Credit to Author: Bob McArdle| Date: Tue, 25 Jul 2017 11:00:49 +0000

What can a hacker do with access to your business email account?CopyKittens is a cyberespionage group that ClearSky has been reporting on since 2015, tracking their attacks on government-related bodies around the world. Trend Micro has supported this research at several points, including for their latest report released today on the group’s vast espionage campaigns. This research highlights new malware, exploitation, delivery, and command and control…

Read more

FIRST and Beyond – a History of Elevating Research through Partnerships

Credit to Author: Martin Roesler (Director, Threat Research)| Date: Tue, 13 Jun 2017 16:30:53 +0000

At the FIRST conference in San Juan, Trend Micro’s Forward-looking Threat Research team will be presenting four sessions on a wide range of topics. These sessions will demonstrate a sliver of the research going on at Trend Micro, and some of the partnerships that elevate the research to benefit the global business community. For the…

Read more

The Jetson’s Cyber Concerns – Future Smart Cities Cybersecurity Checklist

Credit to Author: Jon Clay| Date: Tue, 30 May 2017 12:00:36 +0000

As cities continue to grow smarter, they will also become easier to hack. With millions (if not billions) of dollars going into research for urban domains and the Internet of Things (IoT), there will be more opportunities to utilize technology to define, access and improve smart city services and infrastructure. In these smart cities, information…

Read more

A Storm’s a Coming: How businesses can defend against threat actor groups like Pawn Storm

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Tue, 25 Apr 2017 14:00:47 +0000

It's critical to hire a CISO that has experience and can lead a team.Pawn Storm (aka Sednit5, Fancy Bear, APT28, Sofacy and STRONTIUM8) might sound like Instagram accounts, top-secret spy programs or recently passed legislation, but in reality they are all different names for the same successful cyber espionage group (or threat actor group). These actors often use multi-angle bombardment attacks on the same target, implementing multiple methods…

Read more

Securing Our Smart Cities: Why We All Need to Be Aware of the Threats Out There

Smart cities are redefining the way we live and work. Blending cutting edge IoT technologies with virtualization, big data, cloud and more, they represent an urgent and ongoing attempt to overcome the challenges associated with rapid urbanization. There’s just one problem. These vast, interconnected technology systems also raise serious privacy and security concerns. That’s why…

Read more