- Today, the Russian underground has predictably matured with a growing number of illicit products and services and an improved infrastructure. See how this thriving underground market has evolved.This Trend Micro research paper offers a look into an important—yet often overlooked—component used by major cybercrime operations: Bulletproof Hosting Services.An in-depth look into the duality of the Deep Web—how its anonymity allows free communication and the trade of illegal goods and services. See how it impacts the real world today, and how it could evolve over the next few years.This Trend Micro research paper highlights how cybercriminals are able to use unsophisticated software to execute high-impact attacks.This research paper offers a look into "Operation Tropic Trooper", an ongoing targeted attack campaign that uses old infiltration tactics to steal state and industry secrets since 2012.This research paper provides an in-depth look at noteworthy IRS tax scam components, how they work, and how taxpayers can avoid becoming victims of fraud.A closer look at a one-man operation that managed to steal more than 22,000 credit card numbers in a month using PoS malware. Learn more about the changing dynamics of the underground PoS malware economy in this research paper.This research provides a comprehensive look into the security challenges and attacks on critical infrastructure that member states of the Organization of American States had to face in 2014.Sextortion operations aren't new, but a new modus operandi that makes use of malware and mobile devices is emerging in East Asia. This research paper offers an in-depth look at the operation, its perpetrators, as well as their tools and methods.