The Life Cycle of a Compromised (Cloud) Server

Trend Micro Research has developed a go-to resource for all things related to cybercriminal underground hosting and infrastructure. Today we released the second in this three-part series of reports which detail the what, how, and why of cybercriminal hosting (see the first part here). As part of this report, we dive into the common life…
The post The Life Cycle of a Compromised (Cloud) Server appeared first on . Read More HERE…

Read more

This Week in Security News: Holiday Cybercriminals & Cryptomining Malware

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn the common threats and the best practices for defending against cybercriminals during November’s online shopping season. Also, see the different cryptomining malware affecting Linux systems and…
The post This Week in Security News: Holiday Cybercriminals & Cryptomining Malware appeared first on . Read More HERE…

Read more

Cybercriminals Changing Tactics as Seen in First Half Report

Today, Trend Micro released its first half 2018 security roundup report in which we want to share the threat intelligence we discovered through the Trend Micro™ Smart Protection Network™ that allows us to identify the threats that have targeted our customer base. Below are some thoughts I’d like to share with you about these trends…
The post Cybercriminals Changing Tactics as Seen in First Half Report appeared first on . Read More HERE…

Read more

The trend toward cryptojacking: What it is and how businesses can prevent it

Digital attacks have evolved quite a bit in recent years. First, businesses and researchers observed a rash of ransomware, wherein encryption was exploited to lock users out of their data and files in an attempt to collect financial ransom. Now, the next big wave in cybercriminal strategy has come, involving increasingly popular cryptocurrencies and the…
The post The trend toward cryptojacking: What it is and how businesses can prevent it appeared first on . Read More HERE…

Read more