Although the general public thinks of underground forums as a place where scams and suspicious dealings are rampant, the opposite is usually true: the threat actors who inhabit these sites often consider their reputation a major asset.
A review of critical cybersecurity incidents that affected government legislation and the policies of multinational enterprises across the world in 2018
Fileless threats aren’t as visible compared to traditional malware and employ a variety of techniques to stay persistent. Here's a closer look at how fileless malware work and what can be done to thwart them.
Security plays a crucial role in creating and operating smart factories. By identifying the building blocks of IIoT security, organizations can plan and implement strong security measures for smart factory systems.
The modern cybercrime landscape has changed much from around a decade ago, when most criminals either built their own toolsets or hired other developers to create them.
As of 2018, global losses to BEC have exceeded US$12 billion. To keep abreast of the landscape that scammers are operating in, we look back on some of the noteworthy incidents and trends that made BEC a headline staple this year.
Data from Trend Micro’s managed detection and response shows how the cybersecurity policies of organizations are reflected by the threats they most often face.
The notorious, disk-wiping worm Shamoon, also known as Disttrack, has reemerged with an updated version. Here’s what users and organizations need to know about this threat.