{"id":381686,"date":"2020-11-16T08:10:17","date_gmt":"2020-11-16T13:10:17","guid":{"rendered":"http:\/\/www.marketnewsdesk.com\/?p=381686"},"modified":"2020-11-16T08:10:17","modified_gmt":"2020-11-16T13:10:17","slug":"cybercriminals-use-cloud-technology-to-accelerate-business-attacks","status":"publish","type":"post","link":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\/","title":{"rendered":"Cybercriminals Use Cloud Technology to Accelerate Business Attacks"},"content":{"rendered":"<div class=\"xn-newslines\">\n<h2 class=\"xn-hedline\">Trend Micro Research finds terabytes of stolen data sold in cloud logs making cybercrime more widespread and effective<\/h2>\n<p class=\"xn-distributor\">PR Newswire<\/p>\n<\/p><\/div>\n<div class=\"xn-content\">\n<p \/>\n<p>\n        <span class=\"xn-location\">DALLAS<\/span>, <span class=\"xn-chron\">Nov. 16, 2020<\/span> \/PRNewswire\/ &#8212;\u00a0<a target=\"_blank\" href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=2981706-1&amp;h=2255221679&amp;u=http%3A%2F%2Fwww.trendmicro.com%2F&amp;a=Trend+Micro+Incorporated\" rel=\"nofollow noopener noreferrer\">Trend Micro Incorporated<\/a>\u00a0(<a target=\"_blank\" href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=2981706-1&amp;h=3387656478&amp;u=http%3A%2F%2Fwww.google.com%2Ffinance%3Fq%3DTYO%3A4704&amp;a=TYO%3A+4704\" rel=\"nofollow noopener noreferrer\">TYO: 4704<\/a>;<a target=\"_blank\" href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=2981706-1&amp;h=355946450&amp;u=http%3A%2F%2Fwww.trendmicro.com%2Fus%2Fabout-us%2Finvestor-relations%2Findex.html&amp;a=%C2%A0TSE%3A+4704\" rel=\"nofollow noopener noreferrer\">\u00a0TSE: 4704<\/a>), the leader in cloud security, has identified a new class of cybercrime. Criminals are using cloud services and technology to speed up attacks, which decreases the amount of time enterprises have to identify and respond to a breach.<\/p>\n<div class=\"PRN_ImbeddedAssetReference\" id=\"DivAssetPlaceHolder1\">\n<p>\n          <a href=\"https:\/\/mma.prnewswire.com\/media\/1334347\/Trend_Micro_Incorporated.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><br \/>\n            <img decoding=\"async\" src=\"https:\/\/mma.prnewswire.com\/media\/1334347\/Trend_Micro_Incorporated.jpg\" title=\"\" alt=\"\" \/><br \/>\n          <\/a>\n        <\/p>\n<\/p><\/div>\n<p>These findings are published in a new report from Trend Micro Research: <a target=\"_blank\" href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=2981706-1&amp;h=4259754240&amp;u=https%3A%2F%2Fwww.trendmicro.com%2Fvinfo%2Fus%2Fsecurity%2Fnews%2Fcybercrime-and-digital-threats%2Fcybercriminal-cloud-of-logs-the-emerging-underground-business-of-selling-access-to-stolen-data&amp;a=https%3A%2F%2Fwww.trendmicro.com%2Fvinfo%2Fus%2Fsecurity%2Fnews%2Fcybercrime-and-digital-threats%2Fcybercriminal-cloud-of-logs-the-emerging-underground-business-of-selling-access-to-stolen-data\" rel=\"nofollow noopener noreferrer\">https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/cybercriminal-cloud-of-logs-the-emerging-underground-business-of-selling-access-to-stolen-data<\/a>.<\/p>\n<p>Trend Micro Research found terabytes of internal business data and logins for popular providers like Amazon, Google, Twitter, Facebook, and PayPal offered for sale on the dark web. This data is sold via access to the cloud logs in which it is stored. This results in more stolen accounts being monetized, and the time from initial data theft to stolen information being used against an enterprise has decreased from weeks to days or hours.<\/p>\n<p>&#8220;The new market for access to cloud logs ensures stolen information can be used more quickly and effectively by the cybercrime community\u2014that&#8217;s bad news for enterprise security teams,&#8221; said <span class=\"xn-person\">Robert McArdle<\/span>, director of forward-looking threat research for Trend Micro. &#8220;This new cybercriminal market shows how criminals are using cloud technologies to compromise you. Which also means a business is not exempt from this attack method if they only use on-prem services. All organizations will need to double down on preventative measures and ensure they have the visibility and controls needed to react fast to any incidents that occur.&#8221;<\/p>\n<p>Once access is purchased for logs of cloud-based stolen data, the purchaser will use the information for secondary infection. For example, Remote Desktop Protocol (RDP) credentials can be found in these logs and are a popular entry point for criminals targeting enterprises with ransomware. <\/p>\n<p>Storing terabytes of stolen data in cloud environments has similar appeal for criminal businesses as it does for legitimate organizations. Cloud storage offers scalability and speed that provides more computing power and bandwidth to optimize operations. <\/p>\n<p>Access to these logs of cloud data are often sold on a subscription basis for as much as <span class=\"xn-money\">$1,000<\/span> per month. Access to a single log can include millions of records, and higher prices are earned for frequently updated data sets or the promise of relative exclusivity.<\/p>\n<p>With ready access to data in this way, cybercriminals can streamline and accelerate execution of attacks and potentially expand their number of targets. The result is to optimize cybercrime by ensuring threat actors who specialize in specific areas\u2014say cryptocurrency theft, or e-commerce fraud\u2014can get access to the data they need: quickly, easily and relatively cheaply.<\/p>\n<p>The Trend Micro report warns that in the future, such activity could even give rise to a new type of cybercriminal\u2014an expert in data mining who uses machine learning to enhance pre-processing and extraction of information to maximize its usefulness to buyers. The overall trend will be towards standardization of services and pricing, as the industry matures and professionalizes.\u00a0 <\/p>\n<p>\n        <b>About Trend Micro<br \/><\/b>Trend Micro, a global leader in cybersecurity, helps make the world safe for exchanging digital information. Leveraging over 30 years of security expertise, global threat research, and continuous innovation, Trend Micro enables resilience for businesses, governments, and consumers with connected solutions across cloud workloads, endpoints, email, IIoT, and networks. Our XGen\u2122 security strategy powers our solutions with a cross-generational blend of threat-defense techniques that are optimized for key environments and leverage shared threat intelligence for better, faster protection. With over 6,700 employees in 65 countries, and the world&#8217;s most advanced global threat research and intelligence, Trend Micro enables organizations to secure their connected world. <a target=\"_blank\" href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=2981706-1&amp;h=2652165931&amp;u=http%3A%2F%2Fwww.trendmicro.com%2F&amp;a=www.trendmicro.com\" rel=\"nofollow noopener noreferrer\">www.trendmicro.com<\/a><\/p>\n<div class=\"PRN_ImbeddedAssetReference\" id=\"DivAssetPlaceHolder2\"><\/div>\n<p id=\"PURL\">\n        <img loading=\"lazy\" decoding=\"async\" title=\"Cision\" width=\"12\" height=\"12\" alt=\"Cision\" src=\"https:\/\/c212.net\/c\/img\/favicon.png?sn=SF91667&amp;sd=2020-11-16\" \/> View original content to download multimedia:<a id=\"PRNURL\" rel=\"nofollow\" href=\"http:\/\/www.prnewswire.com\/news-releases\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks-301173009.html\">http:\/\/www.prnewswire.com\/news-releases\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks-301173009.html<\/a><\/p>\n<p>SOURCE  Trend Micro Incorporated<\/p>\n<\/p><\/div>\n<p>    <img decoding=\"async\" alt=\"\" src=\"https:\/\/rt.prnewswire.com\/rt.gif?NewsItemId=SF91667&amp;Transmission_Id=202011160807PR_NEWS_USPR_____SF91667&amp;DateId=20201116\" style=\"border:0px;width:1px;height:1px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trend Micro Research finds terabytes of stolen data sold in cloud logs making cybercrime more widespread and effective PR Newswire DALLAS, Nov. 16, 2020 \/PRNewswire\/ &#8212;\u00a0Trend Micro Incorporated\u00a0(TYO: 4704;\u00a0TSE: 4704), the leader in cloud security, has identified a new class of cybercrime. Criminals are using cloud services and technology to speed up attacks, which decreases the amount of time enterprises have to identify and respond to a breach. These findings are published in a new report from Trend Micro Research: https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/cybercriminal-cloud-of-logs-the-emerging-underground-business-of-selling-access-to-stolen-data. Trend Micro Research found terabytes of internal business data and logins for popular providers like Amazon, Google, Twitter, Facebook, and PayPal offered for sale on the dark web. This data is sold via access to the cloud logs in &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Cybercriminals Use Cloud Technology to Accelerate Business Attacks&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-381686","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybercriminals Use Cloud Technology to Accelerate Business Attacks - Market Newsdesk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercriminals Use Cloud Technology to Accelerate Business Attacks - Market Newsdesk\" \/>\n<meta property=\"og:description\" content=\"Trend Micro Research finds terabytes of stolen data sold in cloud logs making cybercrime more widespread and effective PR Newswire DALLAS, Nov. 16, 2020 \/PRNewswire\/ &#8212;\u00a0Trend Micro Incorporated\u00a0(TYO: 4704;\u00a0TSE: 4704), the leader in cloud security, has identified a new class of cybercrime. Criminals are using cloud services and technology to speed up attacks, which decreases the amount of time enterprises have to identify and respond to a breach. These findings are published in a new report from Trend Micro Research: https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/cybercriminal-cloud-of-logs-the-emerging-underground-business-of-selling-access-to-stolen-data. Trend Micro Research found terabytes of internal business data and logins for popular providers like Amazon, Google, Twitter, Facebook, and PayPal offered for sale on the dark web. This data is sold via access to the cloud logs in &hellip; Continue reading &quot;Cybercriminals Use Cloud Technology to Accelerate Business Attacks&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Market Newsdesk\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-16T13:10:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mma.prnewswire.com\/media\/1334347\/Trend_Micro_Incorporated.jpg\" \/>\n<meta name=\"author\" content=\"Newsdesk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Newsdesk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\\\/\"},\"author\":{\"name\":\"Newsdesk\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"headline\":\"Cybercriminals Use Cloud Technology to Accelerate Business Attacks\",\"datePublished\":\"2020-11-16T13:10:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\\\/\"},\"wordCount\":637,\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mma.prnewswire.com\\\/media\\\/1334347\\\/Trend_Micro_Incorporated.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\\\/\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\\\/\",\"name\":\"Cybercriminals Use Cloud Technology to Accelerate Business Attacks - Market Newsdesk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mma.prnewswire.com\\\/media\\\/1334347\\\/Trend_Micro_Incorporated.jpg\",\"datePublished\":\"2020-11-16T13:10:17+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mma.prnewswire.com\\\/media\\\/1334347\\\/Trend_Micro_Incorporated.jpg\",\"contentUrl\":\"https:\\\/\\\/mma.prnewswire.com\\\/media\\\/1334347\\\/Trend_Micro_Incorporated.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercriminals Use Cloud Technology to Accelerate Business Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\",\"name\":\"Market Newsdesk\",\"description\":\"Latest Business News in Real Time\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\",\"name\":\"Newsdesk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"caption\":\"Newsdesk\"},\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/author\\\/newsdesk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercriminals Use Cloud Technology to Accelerate Business Attacks - Market Newsdesk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Cybercriminals Use Cloud Technology to Accelerate Business Attacks - Market Newsdesk","og_description":"Trend Micro Research finds terabytes of stolen data sold in cloud logs making cybercrime more widespread and effective PR Newswire DALLAS, Nov. 16, 2020 \/PRNewswire\/ &#8212;\u00a0Trend Micro Incorporated\u00a0(TYO: 4704;\u00a0TSE: 4704), the leader in cloud security, has identified a new class of cybercrime. Criminals are using cloud services and technology to speed up attacks, which decreases the amount of time enterprises have to identify and respond to a breach. These findings are published in a new report from Trend Micro Research: https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/cybercriminal-cloud-of-logs-the-emerging-underground-business-of-selling-access-to-stolen-data. Trend Micro Research found terabytes of internal business data and logins for popular providers like Amazon, Google, Twitter, Facebook, and PayPal offered for sale on the dark web. This data is sold via access to the cloud logs in &hellip; Continue reading \"Cybercriminals Use Cloud Technology to Accelerate Business Attacks\"","og_url":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\/","og_site_name":"Market Newsdesk","article_published_time":"2020-11-16T13:10:17+00:00","og_image":[{"url":"https:\/\/mma.prnewswire.com\/media\/1334347\/Trend_Micro_Incorporated.jpg","type":"","width":"","height":""}],"author":"Newsdesk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Newsdesk","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\/#article","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\/"},"author":{"name":"Newsdesk","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"headline":"Cybercriminals Use Cloud Technology to Accelerate Business Attacks","datePublished":"2020-11-16T13:10:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\/"},"wordCount":637,"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/mma.prnewswire.com\/media\/1334347\/Trend_Micro_Incorporated.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\/","url":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\/","name":"Cybercriminals Use Cloud Technology to Accelerate Business Attacks - Market Newsdesk","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/mma.prnewswire.com\/media\/1334347\/Trend_Micro_Incorporated.jpg","datePublished":"2020-11-16T13:10:17+00:00","author":{"@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"breadcrumb":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\/#primaryimage","url":"https:\/\/mma.prnewswire.com\/media\/1334347\/Trend_Micro_Incorporated.jpg","contentUrl":"https:\/\/mma.prnewswire.com\/media\/1334347\/Trend_Micro_Incorporated.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-use-cloud-technology-to-accelerate-business-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.marketnewsdesk.com\/"},{"@type":"ListItem","position":2,"name":"Cybercriminals Use Cloud Technology to Accelerate Business Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.marketnewsdesk.com\/#website","url":"https:\/\/www.marketnewsdesk.com\/","name":"Market Newsdesk","description":"Latest Business News in Real Time","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.marketnewsdesk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979","name":"Newsdesk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","caption":"Newsdesk"},"url":"https:\/\/www.marketnewsdesk.com\/index.php\/author\/newsdesk\/"}]}},"_links":{"self":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/381686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/comments?post=381686"}],"version-history":[{"count":0,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/381686\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/media?parent=381686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/categories?post=381686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/tags?post=381686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}