- This latest paper details the latest activities of Rocket Kitten, a threat actor group involved in Operation Woolen-Goldfish last March, and how they've been found to be attacking multiple targets in the Middle East.In the US and other locations worldwide, gas stations are primarily privately owned. While most of them have been modernized, there are still a lot of risks tied to their business, especially those that are connected to the Internet.Today, the Russian underground has predictably matured with a growing number of illicit products and services and an improved infrastructure. See how this thriving underground market has evolved.This Trend Micro research paper offers a look into an important—yet often overlooked—component used by major cybercrime operations: Bulletproof Hosting Services.An in-depth look into the duality of the Deep Web—how its anonymity allows free communication and the trade of illegal goods and services. See how it impacts the real world today, and how it could evolve over the next few years.This Trend Micro research paper highlights how cybercriminals are able to use unsophisticated software to execute high-impact attacks.This research paper offers a look into "Operation Tropic Trooper", an ongoing targeted attack campaign that uses old infiltration tactics to steal state and industry secrets since 2012.This research paper provides an in-depth look at noteworthy IRS tax scam components, how they work, and how taxpayers can avoid becoming victims of fraud.A closer look at a one-man operation that managed to steal more than 22,000 credit card numbers in a month using PoS malware. Learn more about the changing dynamics of the underground PoS malware economy in this research paper.