What Will It Take?What will it take for policy makers to take cybersecurity seriously? Not minimal-change seriously. Not here-and-there seriously. But really seriously. What will it...
Day: February 23, 2023
Upcoming Speaking Engagements
Upcoming Speaking EngagementsThis is a current list of where and when I am scheduled to speak: I’m speaking at Mobile World Congress 2023 in Barcelona, Spain,...
Camera the Size of a Grain of Salt
Camera the Size of a Grain of SaltCameras are getting smaller and smaller, changing the scale and scope of surveillance. Read MoreSchneier on SecurityCameras are getting...
Finland’s Most-Wanted Hacker Nabbed in France
Finland’s Most-Wanted Hacker Nabbed in FranceJulius “Zeekill” Kivimäki, a 25-year-old Finnish man charged with extorting a local online psychotherapy practice and leaking therapy notes for more...
KrebsOnSecurity in Upcoming Hulu Series on Ashley Madison Breach
KrebsOnSecurity in Upcoming Hulu Series on Ashley Madison BreachKrebsOnSecurity will likely have a decent amount of screen time in an upcoming Hulu documentary series about the...
U.S., U.K. Sanction 7 Men Tied to Trickbot Hacking Group
U.S., U.K. Sanction 7 Men Tied to Trickbot Hacking GroupAuthorities in the United States and United Kingdom today levied financial sanctions against seven men accused of...
Microsoft Patch Tuesday, February 2023 Edition
Microsoft Patch Tuesday, February 2023 EditionMicrosoft is sending the world a whole bunch of love today, in the form of patches to plug dozens of security...
New Protections for Food Benefits Stolen by Skimmers
New Protections for Food Benefits Stolen by SkimmersMillions of Americans receiving food assistance benefits just earned a new right that they can’t yet enforce: The right...
Why do hackers target cryptocurrencies?
Why do hackers target cryptocurrencies?Cyber Security Hub explores why cryptocurrencies are an ever-growing target for malicious actorsRead MoreArticles RSS FeedCyber Security Hub explores why cryptocurrencies are...
Have your say: the global state of cyber security
Have your say: the global state of cyber securityCyber Security Hub's annual survey offers cyber security professionals the opportunity to share their thoughts on the trends,...
The benefits of automating enterprise cyber security
The benefits of automating enterprise cyber securityInsights on perspectives on automation imperatives, inhibitors, talent and budget in the enterprises to prevent threats, vulnerabilities as well as...
Taking the next step: OSS-Fuzz in 2023
Taking the next step: OSS-Fuzz in 2023Posted by Oliver Chang, OSS-Fuzz team Since launching in 2016, Google's free OSS-Fuzz code testing service has helped get over...
The US Government says companies should take more responsibility for cyberattacks. We agree.
The US Government says companies should take more responsibility for cyberattacks. We agree.Posted by Kent Walker, President, Global Affairs & Chief Legal Officer, Google & Alphabet...
Vulnerability Reward Program: 2022 Year in Review
Vulnerability Reward Program: 2022 Year in ReviewPosted by Sarah Jacobus, Vulnerability Rewards Team It has been another incredible year for the Vulnerability Reward Programs (VRPs) at...
Hardening Firmware Across the Android Ecosystem
Hardening Firmware Across the Android EcosystemPosted by Roger Piqueras Jover, Ivan Lozano, Sudhi Herle, and Stephan Somogyi, Android Team A modern Android powered smartphone is a...
What SOCs Need to Know About Water Dybbuk, A BEC Actor Using Open-Source Toolkits
What SOCs Need to Know About Water Dybbuk, A BEC Actor Using Open-Source ToolkitsWe analyze a BEC campaign targeting large companies around the world that was...
Monthly Threat Webinar Series in 2023: What to Expect
Monthly Threat Webinar Series in 2023: What to ExpectStay informed and stay aheadRead MoreTrend Micro Research, News, PerspectivesStay informed and stay ahead
TgToxic Malware’s Automated Framework Targets Southeast Asia Android Users
TgToxic Malware’s Automated Framework Targets Southeast Asia Android UsersWe look into an ongoing malware campaign we named TgToxic, targeting Android mobile users in Taiwan, Thailand, and...
New APT34 Malware Targets The Middle East
New APT34 Malware Targets The Middle EastWe analyze an infection campaign targeting organizations in the Middle East for cyberespionage in December 2022 using a new backdoor...
Hijacking Your Bandwidth: How Proxyware Apps Open You Up to Risk
Hijacking Your Bandwidth: How Proxyware Apps Open You Up to RiskIn this investigation, we analyzed several prominent "passive income" applications and found out that there may...
Earth Zhulong: Familiar Patterns Target Southeast Asian Firms
Earth Zhulong: Familiar Patterns Target Southeast Asian FirmsIn 2022, we discovered Earth Zhulong, a hacking group that has been targeting Asian firms similar to another well-known...
Enigma Stealer Targets Cryptocurrency Industry with Fake Jobs
Enigma Stealer Targets Cryptocurrency Industry with Fake JobsWe discovered an active campaign targeting Eastern Europeans in the cryptocurrency industry using fake job lures.Read MoreTrend Micro Research,...
Earth Kitsune Delivers New WhiskerSpy Backdoor via Watering Hole Attack
Earth Kitsune Delivers New WhiskerSpy Backdoor via Watering Hole AttackWe discovered a new backdoor which we have attributed to the advanced persistent threat actor known as...
Invitation to a Secret Event: Uncovering Earth Yako’s Campaigns
Invitation to a Secret Event: Uncovering Earth Yako’s CampaignsWe detail the intrusion set Earth Yako, attributed to the campaign Operation RestyLink or EneLink. This analysis was...
Royal Ransomware Expands Attacks by Targeting Linux ESXi Servers
Royal Ransomware Expands Attacks by Targeting Linux ESXi ServersRansomware actors have been observed to expand their targets by increasingly developing Linux-based versions. Royal ransomware is following...
A Deep Dive into the Evolution of Ransomware Part 1
A Deep Dive into the Evolution of Ransomware Part 1This 3-part blog series takes an in-depth look at the evolution of ransomware business models, from the...
In Review: What GPT-3 Taught ChatGPT in a Year
In Review: What GPT-3 Taught ChatGPT in a YearAmidst the uproar and opinions since November 2022, we look at the possibilities and implications of what OpenAI’s...
Investigators uncover crypto scammers baiting ‘phish’ hooks on YouTube
Investigators uncover crypto scammers baiting ‘phish’ hooks on YouTubeA report reveals a new network of malefactors in the lucrative crypto fraud market using videos, channels and...
Cryptocurrency users in the US hit by ransomware and Clipper malware
Cryptocurrency users in the US hit by ransomware and Clipper malwareLearn how to protect your business and staff from the MortalKombat ransomware and Laplas Clipper malware....
Cybersecurity pros less likely to be impacted by layoffs if economy slows
Cybersecurity pros less likely to be impacted by layoffs if economy slowsIn the face of recession worries, cybersecurity teams would be least affected by staffing cuts...
