Threat Reports
- Ransomware and BEC scams lead the wave of threats that are turning 2016 into the Year of Online Extortion. Learn how these have changed the landscape and how organizations can protect themselves in our midyear security roundup.2015 laid the groundwork for what we can now consider the new status quo in cybersecurity. Will current security strategies hold against this existing paradigm or will organizations need to consider a change?From big data breaches to attacks on mobile and PoS platforms, What can we learn from the past quarter's notable security stories? Are they early signs of bigger events to come?Attackers are finding more security gaps to abuse, whether they're in existing public-facing technologies or in new developments in the Internet of Things.The biggest incidents in the first three months of 2015 showed that even the most security-savvy users and organizations are not immune to security threats. See how they affected established security measures in the Trend Micro 2015 1Q Security Roundup.A detailed look into the security threats in the ANZ region that were prevalent in 2014, as well as the various trends and user behavior that could have contributed or shaped its threat landscape.Analysis and insight on targeted attack cases in 2014, with information on state-sponsored attacks and the new tools and techniques used.2014 Annual Security Roundup: 2014 was the year of mega breaches, hard-to-patch vulnerabilities, and thriving cybercriminal underground economies.