• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Rogue TrendMicro Employee Responsible for Data Breach

November 7, 2019 by Andrew P. Sardaro Leave a Comment

While many companies are spending a significant amount of their IT budget to protect assets from external attacks, many companies fail to recognize that internal attacks can be just as damaging as external attacks. An internal threat can be an employee holding a sensitive position that may act with malicious or unwitting intent.

In this article, we have an internal threat acting with malicious intent.

Trend Micro announced a security incident where an employee gained access to the personal data of thousands of its customers and sold it to a malicious third-party tech support scammers.

Per Trend Micro,  68,000 of the company’s 12 million customers were impacted by this internal attack, and the stolen data contained customers’ names, email addresses, Trend Micro support ticket numbers, and phone numbers.

Trend Micro became aware of the breach in August 2019 when customers reported receiving calls by criminals who purchased the stolen data and were impersonating Tren Micro employees.

https://thehackernews.com/2019/11/insider-threat-data-breach.html

Filed Under: Week 10: SecuritySheperd Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in