February 2, 2018 - It is with a mixture of emotion that we must inform you that Interceder will cease its service over the coming weeks. For nearly a decade we have been helping you find relevant information across thousands of news and social sources, to keep you abreast of the latest news. We’re a small team of two who have run Interceder outside of our regular day jobs and are intensely proud of what we managed to accomplish over the years. Through a lack of time to maintain the site and growing costs associated with acquiring, indexing, analysing and hosting content we will be shutting down Interceder for good. All things reach a natural end, but we could not be more grateful for the way you made us part of your day, so instead of saying goodbye we would just like to say thank you!

Trend Micro

Latest articles

22h
techcentral.ie
Why cybercriminals will ‘strategically’ target companiesThis year, extortion attempts will likely target organisations trying to comply
techcentral.ie / Posted 22 hours ago
This year, extortion attempts will likely target organisations trying to comply with new EU privacy laws, says Trend Micro report Cybercriminals continue to ‘follow the money’ as they refine and target attacks against businesses for greater... Read more
1d
Fortune
Top Cybersecurity Firm Names Chief Cybersecurity OfficerThe company has hired Tom Kellermann, a former executive at Trend Micro, a riva
Fortune / Posted yesterday
The company has hired Tom Kellermann, a former executive at Trend Micro, a rival Japanese firm, where he held the same title. Kellermann most recently served as CEO and co-founder of Strategic Cyber Ventures, a cybersecurity-focused venture capital... Read more
6d
The Register
Essex black hat behind Cryptex and reFUD gets two years behind barsalarms so that burglars can get in undetected". The malware vendor was caught
The Register / Posted 6 days ago
alarms so that burglars can get in undetected". The malware vendor was caught after a joint investigation by security firm Trend Micro and the National Crime Agency. A police raid on his house in November 2015 netted him and one other individual... Read more
6d
Gazette News
Cyber criminal Goncalo Esteves sentenced after helping hackers test their productsattempts. "He made a fair bit of money, but he’d probably have made much more,
Gazette News / Posted 6 days ago
attempts. "He made a fair bit of money, but he’d probably have made much more, and certainly for longer, if he’d pursued a legitimate career in cyber security. "We’re grateful to Trend Micro for their ongoing support in tackling cyb... Read more
7d
International Business Times
What is AndroRAT? New Android malware comes with extensive spying and data-stealing abilities also discovered by cybercriminals, which in turn launched its malicious journey
International Business Times / Posted 7 days ago
also discovered by cybercriminals, which in turn launched its malicious journey. According to security researchers at Trend Micro, who discovered the new version of the malware, it targets a vulnerability that was publicly disclosed in 2016.... Read more
8d
International Business Times
Confucius hacker group targets singles in romance scam to steal data via backdoor chat apps According to security researchers at Trend Micro, who discovered the new campai
International Business Times / Posted 8 days ago
According to security researchers at Trend Micro, who discovered the new campaign, Confucius' operations bear similarities to a cyberespionage group known as Patchwork or Dropping Elephant. According to previous reports, the Confucius hacker group... Read more
10d
International Business Times
Winter Olympics hit by cyberattack during opening ceremony but officials refuse to say who did it 80km from the border with North Korea - security experts had warned that the ev
International Business Times / Posted 10 days ago
80km from the border with North Korea - security experts had warned that the event would likely be targeted by hackers. Trend Micro researchers said the Kremlin-linked hacking outfit Fancy Bear, also known as APT28 or Pawn Storm, has been... Read more
10 related articles
16d
The Hill
Hacking threats loom over 2018 Olympics| Booz Allen scores massive cyber contract with DHS | GOP chairman talks cyber engagement abroadattacks around Olympic supporting systems and the games themselves,” Mark Nunni
The Hill / Posted 16 days ago
attacks around Olympic supporting systems and the games themselves,” Mark Nunnikhoven, vice president of cloud research at Trend Micro, told The Hill. Researchers at McAfee say they have identified a cyber operation that appears to be targeting... Read more
18d
The Hill
Hacking threats loom over 2018 Olympicsattacks around Olympic supporting systems and the games themselves,” Mark Nunni
The Hill / Posted 18 days ago
attacks around Olympic supporting systems and the games themselves,” Mark Nunnikhoven, vice president of cloud research at Trend Micro, told The Hill. Researchers at McAfee say they have identified a cyber operation that appears to be targeting... Read more
19d
International Business Times
These Chrome extensions can hijack computers to mine cryptocurrency and record your every move mine cryptocurrency, and load a tool to record and replay a person's browsing a
International Business Times / Posted 19 days ago
mine cryptocurrency, and load a tool to record and replay a person's browsing activities. According to researchers at Trend Micro, this collection of extensions affected over 423,000 users and was used to form a new botnet called... Read more
19d
techcentral.ie
Here’s how machine learning works best in identifying security threatsTempered machine learning can strengthen cyber defences, says Trend Micro's Oli
techcentral.ie / Posted 19 days ago
Tempered machine learning can strengthen cyber defences, says Trend Micro's Oliver Machine learning (ML) appears to have suddenly emerged in security, and almost as quickly it has assumed the mantle of a new “next-generation” tool to tackle... Read more
21d
The Sacramento Bee
North Korea is barely wired. How did it become a global hacking power?homegrown stuff that we haven’t seen used in any other attack,” said Mark Nunni
The Sacramento Bee / Posted 21 days ago
homegrown stuff that we haven’t seen used in any other attack,” said Mark Nunnikhoven, vice president of cloud research at Trend Micro, a cybersecurity firm with headquarters in Tokyo. “They continue to show a high level of acumen,” Nunnikhoven... Read more
22d
International Business Times
What is WannaMine? New fileless malware uses NSA's leaked EternalBlue exploit to mine cryptocurrency isn't the first time the EternalBlue exploit has been used by hackers to genera
International Business Times / Posted 22 days ago
isn't the first time the EternalBlue exploit has been used by hackers to generate cryptocurrency. Last year, Trend Micro researchers found the exploit was used to boost the spread of the cryptocurrency-mining malware... Read more
22d
Marketing Interactive
Google ads infected by malware geared at cryptocurrency miningremoved from our platforms,” the spokesperson explained. The malware-like atta
Marketing Interactive / Posted 22 days ago
removed from our platforms,” the spokesperson explained. The malware-like attack was first detected by IT security company Trend Micro, which observed the tripling of Coinhive (a type of cryptocurrency) web miner detections following a... Read more
23d
International Business Times
Hackers are now exploiting YouTube ads to hijack your computer and secretly mine cryptocurrency programs seem to be detecting cryptocurrency mining code whenever they visited
International Business Times / Posted 23 days ago
programs seem to be detecting cryptocurrency mining code whenever they visited YouTube. According to cybersecurity firm Trend Micro, these ads helped drive a more than three-fold spike in Coinhive web miner detections. Researchers said the... Read more
26d
asianage
Cryptocurrency mined by hacking YouTube advertisementswhich will that will transfer from one browser to another and ultimately mine t
asianage / Posted 26 days ago
which will that will transfer from one browser to another and ultimately mine the digital currency Monero. According to Trend Micro, a security firm, these advertisements started spreading to victims based in Japan, France, Taiwan, Italy and... Read more
26d
The Register
Crypto-jackers slip Coinhive mining code into YouTube site adshijacking of CPU cycles through crypto-mining JavaScript code has surged over t
The Register / Posted 26 days ago
hijacking of CPU cycles through crypto-mining JavaScript code has surged over the past few days, according to security biz Trend Micro. The reason appears to be a distribution campaign that piggybacks on Google's DoubleClick ads that appear on... Read more
27d
Sun Star
Cybersecurity firm holds internet safety caravanAS ABOUT 30 percent of internet users in the Philippines are kids aging 18 year
Sun Star / Posted 27 days ago
AS ABOUT 30 percent of internet users in the Philippines are kids aging 18 years and younger, the Trend Micro, Inc. and the Junior Chamber International (JCI) Philippines conducted a three-day caravan in different high schools in Davao City to... Read more
27d
Australian Broadcasting Corporation
Tech firms let Russia probe software used by US Governmentat source code for a minute is incredibly dangerous," said Steve Quane, executi
Australian Broadcasting Corporation / Posted 27 days ago
at source code for a minute is incredibly dangerous," said Steve Quane, executive vice president for network defence at Trend Micro, which sells TippingPoint security software to the US military. Worried about those risks to the US Government,... Read more
2 related articles
28d
International Business Times
Fancy Bear: Russia-linked hackers leak 'stolen emails and documents' from International Luge Federation are a retaliation against the anti-doping scandal and subsequent Olympic bans.
International Business Times / Posted 28 days ago
are a retaliation against the anti-doping scandal and subsequent Olympic bans. Earlier in January, cybersecurity firm Trend Micro reported that Fancy Bear has been targeting several organisations using spear phishing and credential phishing... Read more
3 related articles
28d
CBC.ca
Blaming North Korea for a cyberattack? Show your workescalates the stakes for no apparent reason," said Mark Nunnikhoven, who is a v
CBC.ca / Posted 28 days ago
escalates the stakes for no apparent reason," said Mark Nunnikhoven, who is a vice president at the cybersecurity company Trend Micro. "There's not enough information publicly released to make that statement confidently. If they have additional... Read more
28d
The Hill
Russia-linked hacker group claims release of documents from International Luge Federationafter experts identified the International Luge Federation as one of Fancy Bear
The Hill / Posted 28 days ago
after experts identified the International Luge Federation as one of Fancy Bear’s targets last year. Cybersecurity firm Trend Micro reported that the group targeted multiple International Olympic Wintersport Federations, including the... Read more
3 related articles
30d
The Hill
Twitter notifies those who interacted with Russian accounts | Trump signs surveillance bill | Lawmakers look to crack down on Chinese tech firms2011, making it the leading so-called hacktivist campaign in recent years, acco
The Hill / Posted 30 days ago
2011, making it the leading so-called hacktivist campaign in recent years, according to new research. Cybersecurity firm Trend Micro issued a report Monday based on analysis of more than 13 million web defacement reports over nearly two... Read more
30d
The Hill
Pakistani hacking campaign leads in website defacements: studySyria sympathizers defaced several Ohio government websites last June, forcing
The Hill / Posted 30 days ago
Syria sympathizers defaced several Ohio government websites last June, forcing the state to take affected servers offline. Trend Micro catalogued more than 100,000 unique defacers and nearly 10 million domains that were compromised over the last 18... Read more
m
The Hill
House panel releases Fusion GPS testimony | Senate votes to extend NSA spy program | Russian hackers find new political targetsas Bannon clashes with Intel membersMellman: On Political Authenticity (Part 2)
The Hill / Posted 1 months ago
as Bannon clashes with Intel membersMellman: On Political Authenticity (Part 2)MORE's campaign. The cybersecurity firm Trend Micro revealed last week that the cyber espionage group known as APT 28, "Fancy Bear" or "Pawn Storm" had begun... Read more
2 related articles
m
Tom's Hardware
Trend Micro Reveals Phishing Campaign Targeting US SenatorsTrend Micro, a Japanese security company, published a report showing that the P
Tom's Hardware / Posted 1 months ago
Trend Micro, a Japanese security company, published a report showing that the Pawn Atom / Fancy Bear cybercrime group has become increasingly aggressive in targeting political organizations and U.S. senators in the last few years. The first evidence... Read more
m
International Business Times
Beware of 'GhostTeam' Android malware that steals Facebook passwords using Google Play apps to house malicious code which hackers could use to steal Facebook passwords. D
International Business Times / Posted 1 months ago
to house malicious code which hackers could use to steal Facebook passwords. Dubbed 'GhostTeam' by cybersecurity company Trend Micro, the code is a form of adware that was caught targeting users across India, Indonesia, Brazil, Vietnam and the... Read more
m
The Hill
Russian hackers move to new political targetsSenate, in the wake of the hacking and disinformation campaign during the 2016
The Hill / Posted 1 months ago
Senate, in the wake of the hacking and disinformation campaign during the 2016 presidential race. The cybersecurity firm Trend Micro revealed last week that the cyber espionage group known as APT 28, “Fancy Bear” or “Pawn Storm” had begun... Read more

In this news