Relatórios de ameaças
- Ransomware and BEC scams lead the wave of threats that are turning 2016 into the Year of Online Extortion. Learn how these have changed the landscape and how organizations can protect themselves in our midyear security roundup.2015 laid the groundwork for what we can now consider the new status quo in cybersecurity. Will current security strategies hold against this existing paradigm or will organizations need to consider a change?From big data breaches to attacks on mobile and PoS platforms, What can we learn from the past quarter's notable security stories? Are they early signs of bigger events to come?Attackers are finding more security gaps to abuse, whether they're in existing public-facing technologies or in new developments in the Internet of Things.The biggest incidents in the first three months of 2015 showed that even the most security-savvy users and organizations are not immune to security threats. See how they affected established security measures in the Trend Micro 2015 1Q Security Roundup.Analysis and insight on targeted attack cases in 2014, with information on state-sponsored attacks and the new tools and techniques used.2014 Annual Security Roundup: 2014 was the year of mega breaches, hard-to-patch vulnerabilities, and thriving cybercriminal underground economies.A look into the threat landscape during the third quarter of 2014 reveals the loopholes and vulnerabilities in often overlooked targets such as routers and PoS systems that were used as attack vectors.