Trend Micro
![](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195728/laptop-eyes-technology-computer-400x200.jpg)
Cyber espionage topping the list of largest security concerns
20 percent of global organizations rank cyber espionage as the most serious threat to their business, with 26 percent struggling to keep up with the rapidly evolving threat …
![magnify](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105905/magnify-400x200.jpg)
The West African cybercriminal ecosystem is unlike any other
While there is still not an actual underground marketplace, cybercrime is pervasive in the West African region. Specifically, scamming operations. The peculiarities of the …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104938/biohazard-400x200.jpg)
Ransomware spiked 752% in new families
2016 was truly the year of online extortion. Cyber threats reached an all-time high, with ransomware and Business Email Compromise (BEC) scams gaining increased popularity …
![lights](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114027/lights-400x200.jpg)
New infosec products of the week: February 10, 2017
Capsule8: Container-aware, real-time threat protection for Linux Capsule8 emerged from stealth mode to unveil its plans for the industry’s first container-aware, …
![research](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110743/research-400x200.jpg)
New infosec products of the week: January 13, 2017
Denim Group enhances ThreadFix platform Denim Group, a leading independent application security firm, today announced the latest version of ThreadFix, the company’s …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112756/money-skull-400x200.jpg)
New sheriffs in town: No More Ransom
A couple of months ago, Intel Security, Kaspersky Lab, Dutch National Police and Europol announced the No More Ransom initiative. Such an initiative was a true example of the …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105608/danger-400x200.jpg)
Next year, attacks will differentiate to penetrate new vulnerable surfaces
The upcoming year will include an increased breadth and depth of attacks, with malicious threat actors differentiating their tactics to capitalize on the changing technology …
![sign](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195057/sign-1-400x200.jpg)
New infosec products of the week: December 2, 2016
Trend Micro offers Deep Security as a Service on AWS Marketplace Trend Micro announced the availability of Trend Micro Deep Security as a Service on AWS Marketplace. This new …
![Icarus](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110038/icarus-400x200.jpg)
Icarus takes control of drones by impersonating their operators
Researcher Jonathan Andersson, a member of Trend Micro’s TippingPoint DVLabs, has demonstrated how a specialized hardware module dubbed Icarus can be used to hijack a …
![online gaming](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110318/online_gaming-400x200.jpg)
Trade of online gaming currencies fuels cybercrime
Though the majority of gaming companies prohibit the real-money trading of online gaming currencies, the practice is still widespread, and according to Trend Micro …
![Android malware](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110426/android-malware-400x200.jpg)
DressCode Android malware found in 3,000 apps
When Check Point researchers unearthed more than 40 apps on Google Play (and 400 on third party app stores) infected with the so-called DressCode malware in late October, it …
![Lock keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114034/keyboard-1-400x200.jpg)
HDDCryptor ransomware uses open source tools to thoroughly own systems
HDDCryptor (aka Mamba) is a particularly destructive piece of ransomware that encrypts files in mounted drives and network shares, locks the computers’ hard disk, and …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD