Business

search ✕
  • Solutions
    • By Challenge
      • By Challenge
        • By Challenge
          Learn more
      • Understand, Prioritize & Mitigate Risks
        • Understand, Prioritize & Mitigate Risks

          Improve your risk posture with attack surface management

          Learn more
      • Protect Cloud-Native Apps
        • Protect Cloud-Native Apps

          Security that enables business outcomes

          Learn more
      • Protect Your Hybrid World
        • Protect Your Hybrid, Multi-Cloud World

          Gain visibility and meet business needs with security

          Learn more
      • Securing Your Borderless Workforce
        • Securing Your Borderless Workforce

          Connect with confidence from anywhere, on any device

          Learn more
      • Eliminate Network Blind Spots
        • Eliminate Network Blind Spots

          Secure users and key operations throughout your environment

          Learn more
      • See More. Respond Faster.
        • See More. Respond Faster.

          Move faster than your adversaries with powerful purpose-built XDR, attack surface risk management, and zero trust capabilities

          Learn more
      • Extend Your Team
        • Extend Your Team. Respond to Threats Agilely

          Maximize effectiveness with proactive risk reduction and managed services

          Learn more
      • Operationalizing Zero Trust
        • Operationalizing Zero Trust

          Understand your attack surface, assess your risk in real time, and adjust policies across network, workloads, and devices from a single console

          Learn more
    • By Role
      • By Role
        • By Role
          Learn more
      • CISO
        • CISO

          Drive business value with measurable cybersecurity outcomes

          Learn more
      • SOC Manager
        • SOC Manager

          See more, act faster

          Learn more
      • Infrastructure Manager
        • Infrastructure Manager

          Evolve your security to mitigate threats quickly and effectively

          Learn more
      • Cloud Builder and Developer
        • Cloud Builder and Developer

          Ensure code runs only as intended

          Learn more
      • Cloud Security Ops
        • Cloud Security Ops

          Gain visibility and control with security designed for cloud environments

          Learn more
    • By Industry
      • By Industry
        • By Industry
          Learn more
      • Healthcare
        • Healthcare

          Protect patient data, devices, and networks while meeting regulations

          Learn more
      • Manufacturing
        • Manufacturing

          Protecting your factory environments – from traditional devices to state-of-the-art infrastructures

          Learn more
      • Oil & Gas
        • Oil & Gas

          ICS/OT Security for the oil and gas utility industry

          Learn more
      • Electric Utility
        • Electric Utility

          ICS/OT Security for the electric utility

          Learn more
      • Automotive
        • Automotive
          Learn more
      • 5G Networks
        • 5G Networks
          Learn more
      • Financial Services
        • Financial Services

          Discover how to innovate securely in the cloud

          Learn more
      • Public Sector
        • Public Sector

          Cybersecurity to protect citizen data

          Learn more
    • Small & Midsized Business Security
      • Small & Midsized Business Security

        Stop threats with comprehensive, set-it-and-forget-it protection

        Learn more
  • Platform
    • Vision One Platform
      • Trend Vision One
        Our Unified Platform

        Bridge threat protection and cyber risk management

        Learn more
    • Attack Surface Management
      • Attack Surface Management

        Operationalize a zero trust strategy

        Learn more
    • XDR (Extended Detection & Response)
      • XDR (Extended Detection & Response)

        Stop adversaries faster with a broader perspective and better context to hunt, detect, investigate, and respond to threats from a single platform

        Learn more
    • Endpoint Security
      • Endpoint Security
        • Endpoint Security Overview

          Defend the endpoint through every stage of an attack

          Learn more
      • Industrial Endpoint Security
        • Industrial Endpoint Security
          Learn more
      • Workload Security
        • Workload Security

          Optimized prevention, detection, and response for endpoints, servers, and cloud workloads

          Learn more
      • Mobile Security
        • Mobile Security

          On-premises and cloud protection against malware, malicious applications, and other mobile threats

          Learn more
      • XDR for Endpoint
        • XDR for Endpoint

          Stop adversaries faster with a broader perspective and better context to hunt, detect, investigate, and respond to threats from a single platform

          Learn more
    • Cloud Security
      • Cloud Security
        • Trend Vision One™
          Cloud Security Overview

          The most trusted cloud security platform for developers, security teams, and businesses

          Learn more
      • Container Security
        • Container Security

          Simplify security for your cloud-native applications with advanced container image scanning, policy-based admission control, and container runtime protection

          Learn more
      • File Storage Security
        • File Storage Security

          Security for cloud file/object storage services leveraging cloud-native application architectures

          Learn more
      • Attack Surface Risk Management for Cloud
        • Attack Surface Risk Management for Cloud

          Proactively discover, assess, and reduce cyber risk

          Learn more
      • XDR for Cloud
        • XDR for Cloud

          Stop adversaries faster with a broader perspective and better context to hunt, detect, investigate, and respond to threats from a single platform

          Learn more
    • Network Security
      • Network Security
        • Network Security Overview

          Expand the power of XDR with network detection and response

          Learn more
      • Network Intrusion Prevention (IPS)
        • Network Intrusion Prevention (IPS)

          Protect against known, unknown, and undisclosed vulnerabilities in your network

          Learn more
      • Breach Detection System (BDS)
        • Breach Detection System (BDS)

          Detect and respond to targeted attacks moving inbound, outbound, and laterally

          Learn more
      • Secure Service Edge (SSE)
        • Secure Service Edge (SSE)

          Redefine trust and secure digital transformation with continuous risk assessments

          Learn more
      • Industrial Network Security
        • Industrial Network Security
          Learn more
      • XDR for Network
        • XDR for Network

          Stop adversaries faster with a broader perspective and better context to hunt, detect, investigate, and respond to threats from a single platform

          Learn more
    • Email Security
      • Email Security

        Stop phishing, malware, ransomware, fraud, and targeted attacks from infiltrating your enterprise

        Learn more
    • Threat Intelligence
      • Threat Intelligence

        Keep ahead of the latest threats and protect your critical data with ongoing threat prevention and analysis

        Learn more
    • All Products, Services and Trials
      • All Products, Services and Trials
        Learn more
    • OT Security
      • OT Security
        • OT Security

          Learn about solutions for ICS / OT security.

          Learn more
      • Industrial Endpoint Security
        • Industrial Endpoint Security
          Learn more
      • Industrial Network Security
        • Industrial Network Security
          Industrial Network Security
      • XDR for OT
        • XDR for OT

          Stop adversaries faster with a broader perspective and better context to hunt, detect, investigate, and respond to threats from a single platform

          Learn more
  • Research
    • Research
      • Research
        • Research
          Learn more
      • Research, News, and Perspectives
        • Research, News, and Perspectives
          Learn more
      • Research and Analysis
        • Research and Analysis
          Learn more
      • Security News
        • Security News
          Learn more
      • Zero Day Initiatives (ZDI)
        • Zero Day Initiatives (ZDI)
          Learn more
  • Services
    • Our Services
      • Our Services
        • Our Services
          Learn more
      • Service Packages
        • Service Packages

          Augment security teams with 24/7/365 managed detection, response, and support

          Learn more
      • Managed XDR
        • Managed XDR

          Augment threat detection with expertly managed detection and response (MDR) for email, endpoints, servers, cloud workloads, and networks

          Learn more
      • Incident Response
        • Incident Response
          • Incident Response

            Our trusted experts are on call whether you're experiencing a breach or looking to proactively improve your IR plans

            Learn more
        • Insurance Carriers and Law Firms
          • Insurance Carriers and Law Firms

            Stop breaches with the best response and detection technology on the market and reduce clients’ downtime and claim costs

            Learn more
      • Support Services
        • Support Services
          Learn more
  • Partners
    • Partner Program
      • Partner Program
        • Partner Program Overview

          Grow your business and protect your customers with the best-in-class complete, multilayered security

          Learn more
      • Managed Service Provider
        • Managed Service Provider

          Partner with a leading expert in cybersecurity, leverage proven solutions designed for MSPs

          Learn more
      • Cloud Service Provider
        • Cloud Service Provider

          Add market-leading security to your cloud service offerings – no matter which platform you use

          Learn more
      • Professional Services
        • Professional Services

          Increase revenue with industry-leading security

          Learn more
      • Resellers
        • Resellers

          Discover the possibilities

          Learn more
      • Marketplace
        • Marketplace
          Learn more
      • System Integrators
        • System Integrators
          Learn more
      • Managed Security Service Provider
        • Managed Security Service Provider

          Deliver modern security operations services with our industry-leading XDR

          Learn more
    • Alliance Partners
      • Alliance Partners
        • Alliance Overview

          We work with the best to help you optimize performance and value

          Learn more
      • Technology Alliance Partners
        • Technology Alliance Partners
          Learn more
      • Our Alliance Partners
        • Our Alliance Partners
          Learn more
    • Partner Tools
      • Partner Tools
        • Partner Tools
          Learn more
      • Partner Login
        • Partner Login
          Login
      • Education and Certification
        • Education and Certification
          Learn more
      • Partner Successes
        • Partner Successes
          Learn more
      • Distributors
        • Distributors
          Learn more
      • Find a Partner
        • Find a Partner
          Learn more
  • Company
    • Why Trend Micro
      • Why Trend Micro
        • Why Trend Micro
          Learn more
      • Customer Success Stories
        • Customer Success Stories
          Learn more
      • Industry Accolades
        • Industry Accolades
          Learn more
      • Strategic Alliances
        • Strategic Alliances
          Learn more
    • About Us
      • About Us
        • About Us
          Learn more
      • Trust Center
        • Trust Center
          Learn more
      • History
        • History
          Learn more
      • Diversity, Equity and Inclusion
        • Diversity, Equity and Inclusion
          Learn more
      • Corporate Social Responsibility
        • Corporate Social Responsibility
          Learn more
      • Leadership
        • Leadership
          Learn more
      • Security Experts
        • Security Experts
          Learn more
      • Internet Safety and Cybersecurity Education
        • Internet Safety and Cybersecurity Education
          Learn more
      • Legal
        • Legal
          Learn more
      • Investors
        • Investors
          Learn more
    • Connect with Us
      • Connect with Us
        • Connect with Us
          Learn more
      • Newsroom
        • Newsroom
          Learn more
      • Events
        • Events
          Learn more
      • Careers
        • Careers
          Learn more
      • Webinars
        • Webinars
          Learn more
    • End of Support
      • End of Support

        Patch management is a fundamental component for handling vulnerabilities

        Learn more
  • Free Trials
  • Contact Us
Looking for home solutions?
Under Attack?
Support
  • Business Support Portal
  • Business Community
  • Virus and Threat Help
  • Education and Certification
  • Contact Support
  • Find a Support Partner
Resources
  • Cyber Risk Index/Assessment
  • CISO Resource Center
  • DevOps Resource Center
  • What Is?
  • Threat Encyclopedia
  • Cloud Health Assessment
  • Cyber Insurance
  • Glossary of Terms
  • Webinars
Log In
  • Support
  • Partner Portal
  • Cloud One
  • Product Activation and Management
  • Referral Affililate
➔
search
✕
  • Security News
  • Business Email Compromise

Business Email Compromise

PREVIOUS
NEXT
  • PAGES:
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • Report: Average BEC Attacks per Month Increased by 120% From 2016 to 2018

    July 18, 2019
    The total amount cybercriminals attempted to steal via business email compromise (BEC) scams rose to an alarming average of US$301 million per month — a substantial increase from the US$110 million monthly average that was tracked in 2016.
    Read more   
  • Fake Invoices Used by BEC Scammers to Defraud Griffin City, Georgia of Over US$800,000

    July 12, 2019
    The government of the City of Griffin, Georgia, lost over US$800,000 to a business email compromise (BEC) scam last month.
    Read more   
  • BEC Scammers Steal US$1.75 Million From an Ohio Church

    May 02, 2019
    BEC threat actors are expanding from their traditional enterprise victims toward nonprofit and religious organizations, with a recent incident involving a church.
    Read more   
  • New Business Email Compromise Scheme Reroutes Paycheck by Direct Deposit

    April 16, 2019
    A new business email compromise (BEC) scheme, where attacker tricks the recipients into rerouting paychecks by direct deposit, has emerged.
    Read more   
  • London Blue Group Using Evolving BEC Techniques in Attacks

    April 10, 2019
    The threat actor London Blue has been refining its BEC techniques and expanding its scope for both targets and regions.
    Read more   
  • Google and Facebook Fraudster Pleads Guilty to $100 million Scam

    March 26, 2019
    A business email compromise (BEC) scheme took more than $100 million from Facebook and Google. Legitimate-looking invoices, contracts and more fooled the two tech companies and they wired millions to the fraudsters over a period of years.
    Read more   
  • Attackers Use Legacy IMAP Protocol to Bypass Multifactor Authentication in Cloud Accounts, Leading to Internal Phishing and BEC

    March 22, 2019
    Brute-force attacks against user accounts in cloud services prove that multifactor authentication is only one part of an effective multilayered security implementation.
    Read more   
  • Smarter Phishing Techniques Observed as Cybersecurity Tools Become Advanced

    March 15, 2019
    As cybersecurity technology becomes better at detecting email-based threats, attackers continue to employ leveled up social engineering tactics – such as phishing – to increase the likelihood of users falling for fraud, identity theft, or spoofing.
    Read more   
  • Trend Micro Cloud App Security Report 2018: Advanced Defenses for Advanced Email Threats

    March 04, 2019
    To provide organizations a comprehensive view of the email threat landscape, we look at notable occurrences of advanced email threats used by cybercriminals as well as advanced security techniques that can effectively defend against them.
    Read more   
  • PAGES:
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
PREVIOUS
NEXT

Try our services free for 30 days

  • Start your free trial today

Resources

  • Blog
  • Newsroom
  • Threat Reports
  • DevOps Resource Center
  • CISO Resource Center
  • Find a Partner

Support

  • Business Support Portal
  • Contact Us
  • Downloads
  • Free Trials

About Trend

  • About Us
  • Careers
  • Locations
  • Upcoming Events
  • Trust Center

Select a country / region

✕

The Americas

  • United States
  • Brasil
  • Canada
  • México

Middle East & Africa

  • South Africa
  • Middle East and North Africa

Europe

  • België (Belgium)
  • Česká Republika
  • Danmark
  • Deutschland, Österreich Schweiz
  • España
  • France
  • Ireland
  • Italia
  • Nederland
  • Norge (Norway)
  • Polska (Poland)
  • Suomi (Finland)
  • Sverige (Sweden)
  • Türkiye (Turkey)
  • United Kingdom

Asia & Pacific

  • Australia
  • Центральная Азия (Central Asia)
  • Hong Kong (English)
  • 香港 (中文) (Hong Kong)
  • भारत गणराज्य (India)
  • Indonesia
  • 日本 (Japan)
  • 대한민국 (South Korea)
  • Malaysia
  • Монголия (Mongolia) and рузия (Georgia)
  • New Zealand
  • Philippines
  • Singapore
  • 台灣 (Taiwan)
  • ประเทศไทย (Thailand)
  • Việt Nam

Privacy | Legal | Site map

Copyright ©2023 Trend Micro Incorporated. All rights reserved