The Life Cycle of a Compromised (Cloud) Server

Trend Micro Research has developed a go-to resource for all things related to cybercriminal underground hosting and infrastructure. Today we released the second in this three-part series of reports which detail the what, how, and why of cybercriminal hosting (see the first part here). As part of this report, we dive into the common life…
The post The Life Cycle of a Compromised (Cloud) Server appeared first on . Read More HERE…

Read more

Twitter Hacked in Bitcoin Scam

Twitter Hacked in Bitcoin Scam It started with one weird tweet. Then another. Quickly, some of the most prominent accounts on Twitter were all sending out the same message; I am giving back to the community. All Bitcoin sent to the address below will be sent back doubled! If you send $1,000, I will send…
The post Twitter Hacked in Bitcoin Scam appeared first on . Read More HERE…

Read more

How the Cybercriminal Underground Has Changed in 5 Years

The cybercrime economy is one of the runaway success stories of the 21st century — at least, for those who participate in it. Estimates claim it could be worth over $1 trillion annually, more than the GDP of many countries. Part of that success is due to its ability to evolve and shift as the…
The post How the Cybercriminal Underground Has Changed in 5 Years appeared first on . Read More HERE…

Read more

Teaming up with INTERPOL to combat COVID-19 threats

If the past couple of months have taught us anything, it’s that partnerships matter in times of crisis. We’re better, stronger and more resilient when we work together. Specifically, public-private partnerships matter in cybersecurity, which is why Trend Micro is always happy to reach out across industry, academia and law enforcement to offer its expertise….
The post Teaming up with INTERPOL to combat COVID-19 threats appeared first on . Read More HERE…

Read more

INTERPOL Collaboration Reduces Cryptojacking by 78%

Cybercriminals are often seen as having the upper hand over the “white hat” community. After all, they’re anonymous, can launch attacks from virtually anywhere in the world, and usually have the element of surprise. But there’s one secret weapon the good guys have: Collaboration. That’s why Trend Micro has always prioritized its partnerships with law…
The post INTERPOL Collaboration Reduces Cryptojacking by 78% appeared first on . Read More HERE…

Read more

3 Ways for MSPs to Increase Their Managed Security Footprint

Managed service providers looking to increase their business often face the choice of whether to focus on finding new customers or expanding their existing base. But there’s a growing opportunity making the latter option especially appealing. The small and midsize businesses that comprise the bulk of the MSP customer base have a limited understanding of…
The post 3 Ways for MSPs to Increase Their Managed Security Footprint appeared first on . Read More HERE…

Read more

Are IoT Threats Discussed In The Cybercriminal Underground?

With IoT devices expected to reach tens of billions in the next few years, is it any wonder that cybercriminals are looking for ways to take advantage of this massive attack surface to generate illicit money? A number of Trend Micro researchers from around the globe decided to look into this and launched a research…
The post Are IoT Threats Discussed In The Cybercriminal Underground? appeared first on . Read More HERE…

Read more

This Week in Security News: Ransomware Campaigns Persist with WannaCry as Most Common

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how a total of 118 new ransomware families emerged in the first half of 2018, but only 47 new ones debuted in the first six…
The post This Week in Security News: Ransomware Campaigns Persist with WannaCry as Most Common appeared first on . Read More HERE…

Read more

Three Common Email Security Mistakes That MSPs Make

  MSPs can generate recurring revenue by being proactive about educating customers about email threats and how to defeat them—if they avoid three common mistakes.   Businesses have come to rely on cloud email and file-sharing applications for communication and productivity. But, too often, they assume these platforms’ built-in security delivers enough protection against email-borne…
The post Three Common Email Security Mistakes That MSPs Make appeared first on . Read More HERE…

Read more

Cyberattack Lateral Movement Explained

[Lightly edited transcript of the video above] Hi there, Mark Nunnikhoven from Trend Micro Research, I want to talk to you about the concept of lateral movement. And the reason why I want to tackle this today is because I’ve had some conversations in the last few days that have really kind of hit that…
The post Cyberattack Lateral Movement Explained appeared first on . Read More HERE…

Read more