{"id":42227,"date":"2021-06-24T00:00:00","date_gmt":"2021-06-24T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/research\/21\/f\/are-tax-breaks-encouraging-ransom-payments.html"},"modified":"2021-06-24T00:00:00","modified_gmt":"2021-06-24T00:00:00","slug":"are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\/","title":{"rendered":"Are Tax Breaks Encouraging Ransom Payments? VP, Threat Intelligence"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/are-tax-breaks-encouraging-ransom-payments\/ransomware-tax.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/are-tax-breaks-encouraging-ransom-payments\/ransomware-tax.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The pressure is mounting on the White House to produce some kind of coherent action plan to tackle the ransomware epidemic sweeping the US and the world. But while we wait for the details on that, news emerged over the weekend that the government may unwittingly be providing another incentive to victim corporations to pay-up when confronted by a breach.<\/p>\n<p>According to the <a href=\"https:\/\/apnews.com\/article\/technology-business-government-and-politics-d8c1e9958ad1e89eab83f44e6ca70a94\" target=\"_blank\" rel=\"noopener\">Associated Press article<\/a>, the Internal Revenue Service (IRS) may allow these companies to deduct any payments from their annual tax bill. It\u2019s exactly the opposite to what needs to happen.<\/p>\n<p><b><span class=\"body-subhead-title\">A growing menace<\/span><\/b><\/p>\n<p>We all know the incredible pressure organizations are under today from a highly motivated, well resourced, and growing number of threat actors. Trend Micro detected a 34% increase in new <a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/research-and-analysis\/threat-reports\/roundup\/a-constant-state-of-flux-trend-micro-2020-annual-cybersecurity-report\" target=\"_blank\" rel=\"noopener\">ransomware families in 2020<\/a> versus the previous year, and that\u2019s not counting the large number of affiliate groups that have sprung up over the past few months.<\/p>\n<p>They\u2019re using increasingly sophisticated tools and techniques to get what they want: multi-stage APT-style attacks <a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/news\/cybercrime-and-digital-threats\/locked-loaded-and-in-the-wrong-hands-legitimate-tools-weaponized-for-ransomware-in-2021\" target=\"_blank\" rel=\"noopener\">using legitimate tools<\/a> to move laterally and exfiltrate data, and <a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/news\/cybercrime-and-digital-threats\/ransomware-double-extortion-and-beyond-revil-clop-and-conti\" target=\"_blank\" rel=\"noopener\">quadruple extortion tactics.<\/a> There will always be a chink in the corporate cybersecurity armor for these actors to penetrate. The challenge for many up until now has been to find the right <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/detection-response.html\" target=\"_blank\" rel=\"noopener\">detection and response tooling<\/a> to spot and react to breaches before the bad guys have had a chance to do any damage.<\/p>\n<p><b><span class=\"body-subhead-title\">Time for action<\/span><\/b><\/p>\n<p>Attacks on <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/e\/what-we-know-about-darkside-ransomware-and-the-us-pipeline-attac.html\" target=\"_blank\" rel=\"noopener\">Colonial Pipeline<\/a> and JBS brought home to senior policymakers the reality that many critical supply chains may be at risk. To its credit, the Biden administration has already begun to ramp up a response to the growing menace of ransomware. So far it has:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><a href=\"https:\/\/www.nytimes.com\/2021\/06\/03\/us\/politics\/ransomware-cybersecurity-infrastructure.html\" target=\"_blank\" rel=\"noopener\">Issued a letter<\/a> from the National Security Council\u2019s chief of cyber urging companies to take the threat more seriously<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Set up a DOJ <a href=\"https:\/\/www.forbes.com\/sites\/carlieporterfield\/2021\/06\/03\/department-of-justice-creates-new-task-force-to-take-on-ransomware-attacks\/\" target=\"_blank\" rel=\"noopener\">Ransomware and Digital Extortion Task Force<\/a> to centralize and coordinate investigations<\/span><\/li>\n<li><span class=\"rte-red-bullet\"><a href=\"https:\/\/www.nbcnews.com\/politics\/national-security\/they-are-hair-fire-biden-admin-mulling-cyber-attacks-against-n1269575\" target=\"_blank\" rel=\"noopener\">Reportedly moved<\/a> to treat ransomware as national security threat, unleashing the power of national intelligence agencies on foreign cyber-criminals<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Listed 16 critical infrastructure entities to President Vladimir Putin that should be off limits to cyber attacks<\/span><\/li>\n<\/ul>\n<p>However, we\u2019ve yet to see these policies bear fruit. Trend Micro stands with the FBI in urging victim organizations not to pay their extorters. Doing so has in many ways led to the situation we\u2019re in right now. Seeing the opportunity for easy money, threat actors have piled in to steal corporate profits. They know the victims will usually pay up, if they choose private companies with hundreds of millions in annual revenue. And they know they will be protected by living in jurisdictions where such attacks are tolerated, as long as they\u2019re directed outside the country at \u201crival\u201d nations.<\/p>\n<p>The bottom line is that we need more disincentives for organizations to pay their ransom. It\u2019s already happening in the cyber-insurance industry, where <a href=\"https:\/\/apnews.com\/article\/europe-france-technology-business-caabb132033ef2aaee9f58902f3e8fba\" target=\"_blank\" rel=\"noopener\">AXA was recently reported<\/a> as halting the reimbursement of ransom payments for its French clients. We can also hope that, over time, insurers get more prescriptive about policyholders\u2019 existing security measures, which will hopefully drive up best practices across the board.<\/p>\n<p>In the meantime, removing the tax incentive would seem like a quick win for the government. It does nothing but further encourage payments, which in turn perpetuates the ransomware threat. It\u2019s not the only thing that needs to happen. Better threat detection and response would also help. But it would be a start.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/f\/are-tax-breaks-encouraging-ransom-payments.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why tax deductions for ransom payments send the wrong signals to threat actors and their victims Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42228,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9511,9522,9514],"class_list":["post-42227","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-expert-perspective","tag-trend-micro-research-iot"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Are Tax Breaks Encouraging Ransom Payments? VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are Tax Breaks Encouraging Ransom Payments? VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-24T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1282\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Are Tax Breaks Encouraging Ransom Payments? VP, Threat Intelligence\",\"datePublished\":\"2021-06-24T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\\\/\"},\"wordCount\":586,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Expert Perspective\",\"Trend Micro Research : IoT\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\\\/\",\"name\":\"Are Tax Breaks Encouraging Ransom Payments? VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence.jpg\",\"datePublished\":\"2021-06-24T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence.jpg\",\"width\":1282,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Are Tax Breaks Encouraging Ransom Payments? VP, Threat Intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Are Tax Breaks Encouraging Ransom Payments? VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\/","og_locale":"en_US","og_type":"article","og_title":"Are Tax Breaks Encouraging Ransom Payments? VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-06-24T00:00:00+00:00","og_image":[{"width":1282,"height":700,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Are Tax Breaks Encouraging Ransom Payments? VP, Threat Intelligence","datePublished":"2021-06-24T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\/"},"wordCount":586,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Cyber Threats","Trend Micro Research : Expert Perspective","Trend Micro Research : IoT"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\/","url":"https:\/\/www.threatshub.org\/blog\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\/","name":"Are Tax Breaks Encouraging Ransom Payments? VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence.jpg","datePublished":"2021-06-24T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence.jpg","width":1282,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/are-tax-breaks-encouraging-ransom-payments-vp-threat-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"Are Tax Breaks Encouraging Ransom Payments? VP, Threat Intelligence"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42227","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42227"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42227\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42228"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42227"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}