Category Archives: Cybercrime and Cyber Attacks

Charting the changes in cybercrime over the past five years

The cybercrime economy is one of the runaway success stories of the 21st century — at least, for those who participate in it. Estimates claim it could be worth over $1trillion annually, more than the GDP of many countries. Part of that success is due to its ability to evolve and shift as the threat landscape changes. Trend Micro has been profiling the underground cybercrime community for several years. And over the past five, we’ve seen a major shift to new platforms, communications channels, products and services, as trust on the dark web erodes and new market demands emerge.

Continue reading

Teaming up with INTERPOL to combat COVID-19 threats

If the past couple of months have taught us anything, it’s that partnerships matter in times of crisis. We’re better, stronger and more resilient when we work together. Specifically, public-private partnerships matter in cybersecurity, which is why Trend Micro is always happy to reach out across industry, academia and law enforcement to offer its expertise.

Continue reading

Zoom threats: how to keep your business and employees safe

Cyber-criminals are always looking for new opportunities to make money and steal data. Globally trending events are a tried-and-tested way of doing just this, and they don’t come much bigger than the current Covid-19 pandemic. It’s sparking a wave of phishing, BEC, extortion, ransomware and data breach attempts. And as increasing numbers of global workers are sent home, new opportunities are opening up to compromise video conferencing apps.

Continue reading

What is Shadow OT and why you should know what it is:

Shadow IT

Photo by Lewis Burrows from Pexels

Yes, you read it correctly: Shadow OT, with an O. We have barely managed to deal with Shadow IT, and a new threat already looms at the horizon. Operational Technology (OT) has become as affordable and available as IT, which leads to yet another cause of IT management worries.   

Continue reading