Category Archives: Hack

Breaches Galore in 2019 Require a Multi-Layered Response

by Ian Heritage

So far, 2019 is looking very similar to last year. We’re only a month into the new year and already the headlines have been filled with news of data breaches, privacy leaks and credential stuffing attacks. And all this as GDPR regulators begin to flex their muscles by levying financial penalties. To stay clear of regulatory trouble and minimise cyber risk, IT teams should remember the best practice basics and layer up multiple connected threat defence tools. Continue reading

As UK Police Cyber Spending Soars, Let’s Not Forget the Value of Public-Private Partnerships

by Bharat Mistry

UK police forces have spent more than £1.3m on cybercrime training over the past three years, according to a new thinktank report. This is great to see, especially considering the escalating threat to consumers and businesses as the nation and its economy become increasingly dependent on digital systems.

But as cybercrime soars while public funding shrinks, law enforcers also need to make the most of private sector partnerships, like the ground-breaking alliance Trend Micro has forged over recent years with the country’s pre-eminent crime agency. Continue reading

Combatting the #Throwhack Threat: Why Legacy Issues Are Still Causing CISOs Problems

by Bharat Mistry

CISOs are regularly bombarded with breaking news on advanced nation state espionage campaigns and sophisticated cybercrime heists. From the ongoing machinations of the Kremlin-linked Pawn Storm group to the recently uncovered cyber-bank raid by the MoneyTaker gang, these threats tend to grab all the headlines. But IT security leaders will know that some of their biggest problems come from legacy threats: what we’re calling “Throwhacks”.

Unlike the popular social media trend “Throwback Thursday”, there’s nothing entertaining about this list of legacy security challenges. Organisations need to get a handle on these threats before they start worrying about hackers armed with advanced AI tools. Continue reading

UK Conviction Arises out of Trend Micro and NCA Partnership

by Trend Micro’s Forward-Looking Threat Research Team

On January 15, Goncalo Esteves from Essex, UK plead guilty on 3 charges of computer offenses under UK law:

  • 2 charges against Section 3A of the Computer Misuse Act 1990 (Making/adapting/supplying an article intended for use/to assist in the commission of a section 1 or 3 Computer Misuse offense)
  • 1 charge against Section 327(1) and Section 334 of the Proceeds of Crime Act 2002 (Concealing/disguising/converting/transferring/removing criminal property)

Continue reading