Die Sicherheitsvoraussagen von Trend Micro für das Jahr 2019 beruhen auf den eigenen Analysen des Fortschritts von derzeitigen und aufkommenden Technologien, des Nutzerverhaltens und der Markttrends.
Business Process Compromise (BPC): Attacks classified as BPC or ‘business process compromise’ silently alter a part of specific business processes in order to generate significant monetary profit for the attackers. Artikel lesen
Die Sicherheitsvoraussagen von Trend Micro für das Jahr 2019 beruhen auf den eigenen Analysen des Fortschritts von derzeitigen und aufkommenden Technologien, des Nutzerverhaltens und der Markttrends.
Security researchers shed light on the cybercriminal group MoneyTaker, reported to have stolen $10 million from financial organizations in the U.S. and Russia. What can enterprises do?
How do we distinguish Business Process Compromise (BPC) from targeted attacks? Can Business Email Compromise (BEC) be considered BPC? All three share similarities, but knowing their distinctions can help enterprises fine-tune their defensive measures.
Past events show that attackers don't just target people, but processes as well. Enterprises should be aware of the of rising possibility of Business Process Compromises.