web analytics

Exposed IoT Automation Servers and Cybercrime

by: Stephen Hilt, Numaan Huq, Martin Rösler, and Akira Urano In our latest research “Cybersecurity Risks in Complex IoT Environments: Threats to Smart Homes, Buildings and Other Structures,” we tested possible threat scenarios against complex IoT environments such as in smart homes and smart buildings. A significant part of the research also involved a look… Continue reading Exposed IoT Automation Servers and Cybercrime

This Week in Security News: Instagram Hackers and Enterprise Threats

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how a group of hackers is stealing popular Instagram profiles. Also, learn about old and new cybersecurity issues inundated enterprises in 2018. Read on: Insecure VPNs:… Continue reading This Week in Security News: Instagram Hackers and Enterprise Threats

Exposed Docker Control API and Community Image Abused to Deliver Cryptocurrency-Mining Malware

by Alfredo Oliveira (Senior Threat Researcher)  Through data analysis of the container honeypots we’ve set up to monitor threats, we’ve uncovered notable activities of undesired or unauthorized cryptocurrency miners being deployed as rogue containers using a community-contributed container image published on Docker Hub. The image is being abused as part of a malicious service that delivers… Continue reading Exposed Docker Control API and Community Image Abused to Deliver Cryptocurrency-Mining Malware

Protecting against the next wave of advanced threats targeting Office 365 – Trend Micro Cloud App Security 2018 detection results and customer examples

Since the release of “Trend Micro Cloud App Security 2017 Report” about a year ago, threats using email as the delivery vector have grown significantly. Business Email Compromise (BEC) scams have already caused USD $12.5 billion in global losses as of 2018 – a 136.4% increase from the $5.3 billion reported in 2017. The popularity… Continue reading Protecting against the next wave of advanced threats targeting Office 365 – Trend Micro Cloud App Security 2018 detection results and customer examples

How a Hacking Group is Stealing Popular Instagram Profiles

by Jindrich Karasek and Cedric Pernet (Threat Researchers) Social media influencers build and expand their business or brand through credibility and authenticity to their audience. For hackers, however, they could be seen as trophies. That’s what happened to a photographer with more than 15,000 followers on Instagram, when she had her account stolen. A closer… Continue reading How a Hacking Group is Stealing Popular Instagram Profiles