- A decade's worth of breaches has led to this. Forward-looking threat researcher Numaan Huq analyzes what has happened to the stolen data affecting major US industries. We map out the probabilities; see where the information goes and how much it's sold.Details from the TorrentLocker infections seen in the first half of 2015, including common evasion techniques and solutions that can be used to defend against the threat.This latest paper details the latest activities of Rocket Kitten, a threat actor group involved in Operation Woolen-Goldfish last March, and how they've been found to be attacking multiple targets in the Middle East.In the US and other locations worldwide, gas stations are primarily privately owned. While most of them have been modernized, there are still a lot of risks tied to their business, especially those that are connected to the Internet.Today, the Russian underground has predictably matured with a growing number of illicit products and services and an improved infrastructure. See how this thriving underground market has evolved.This Trend Micro research paper offers a look into an important—yet often overlooked—component used by major cybercrime operations: Bulletproof Hosting Services.An in-depth look into the duality of the Deep Web—how its anonymity allows free communication and the trade of illegal goods and services. See how it impacts the real world today, and how it could evolve over the next few years.This Trend Micro research paper highlights how cybercriminals are able to use unsophisticated software to execute high-impact attacks.This research paper offers a look into "Operation Tropic Trooper", an ongoing targeted attack campaign that uses old infiltration tactics to steal state and industry secrets since 2012.