While Sony recovers from the massive hack, we continue to monitor investigations and developments. Here's a rundown of what happened, what was stolen, who’s being implicated, and tips on how you can defend against likely attacks. [updated]
This Trend Micro paper unravels a series of attacks that targets military officials and defense contractors. Dubbed as “Operation Pawn Storm,” the group of threat actors use two known attack vectors: spear phishing emails and a network of phishing websites.
Recent data breaches in big enterprises make one thing clear: data privacy and protection is a concern for all organizations, not just large ones. Data privacy isn't just a "big business" problem. Even smaller organizations are at risk.
During the first half of 2014, attacks against Asia-Pacific countries showed some notable techniques used by attackers to evade detection and steal data. This report details the targeted attack campaigns and trends over that period.