{"id":2925,"date":"2025-11-08T09:20:45","date_gmt":"2025-11-08T00:20:45","guid":{"rendered":"https:\/\/blog.yoshisuke.com\/?p=2925"},"modified":"2025-11-08T09:22:34","modified_gmt":"2025-11-08T00:22:34","slug":"caas%ef%bc%88cybercrime-as-a-service%ef%bc%89%e3%81%af%e3%80%81%e9%97%87%e5%b8%82%e5%a0%b4%e3%81%ae%e3%80%8csaas%e5%8c%96%e3%80%8d","status":"publish","type":"post","link":"https:\/\/blog.yoshisuke.com\/?p=2925","title":{"rendered":"CaaS\uff08Cybercrime-as-a-Service\uff09\u306f\u3001\u95c7\u5e02\u5834\u306e\u300cSaaS\u5316\u300d"},"content":{"rendered":"<div class=\"prose dark:prose-invert inline leading-relaxed break-words min-w-0 [word-break:break-word] prose-strong:font-medium [&amp;_&gt;*:first-child]:mt-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">CaaS\uff08Cybercrime-as-a-Service\uff09\u306f\u3001\u95c7\u5e02\u5834\u306e\u300cSaaS\u5316\u300d\u3067\u3059\u3002\u30de\u30eb\u30a6\u30a7\u30a2\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3001DDoS\u3001\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u3001\u30dc\u30c3\u30c8\u30cd\u30c3\u30c8\u3001\u8106\u5f31\u6027\u60aa\u7528\uff08\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\uff09\u3084\u4fb5\u5165\u6e08\u307f\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3078\u306e\u30a2\u30af\u30bb\u30b9\u307e\u3067\u3092\u3001\u6708\u984d\u3084\u51fa\u6765\u9ad8\u3067\u201c\u30ec\u30f3\u30bf\u30eb\u201d\u63d0\u4f9b\u3059\u308b\u30d3\u30b8\u30cd\u30b9\u30e2\u30c7\u30eb\u3092\u6307\u3057\u307e\u3059\u3002\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u30fb\u30ad\u30c3\u30c8\u306f\u3001\u305d\u306e\u4e2d\u6838\u90e8\u54c1\u3067\u3001\u30d6\u30e9\u30a6\u30b6\u3084\u30d7\u30e9\u30b0\u30a4\u30f3\u3001VPN\/\u6a5f\u5668\u306a\u3069\u65e2\u77e5\uff08N-day\uff09\u3084\u672a\u767a\u8868\uff080-day\uff09\u306e\u8106\u5f31\u6027\u3092\u675f\u306d\u3001\u8a2a\u554f\u8005\u306e\u74b0\u5883\u3092\u81ea\u52d5\u5224\u5b9a\u3057\u3066\u6700\u9069\u306a\u653b\u6483\u30b3\u30fc\u30c9\u3092\u6295\u4e0b\u3059\u308b\u653b\u6483\u7528\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u3067\u3059\u3002<span class=\"citation inline\" data-state=\"closed\"><a class=\"inline\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/what-is-caas\/\" target=\"_blank\" rel=\"noopener\"><span class=\"relative -mt-px select-none whitespace-nowrap -top-px font-sans text-base text-foreground selection:bg-super\/50 selection:text-foreground dark:selection:bg-super\/10 dark:selection:text-super\"><span class=\"text-3xs rounded-badge group min-w-4 cursor-pointer text-center align-middle font-mono tabular-nums py-[0.1875rem] leading-snug px-[0.3rem] [@media(hover:hover)]:hover:bg-super dark:[@media(hover:hover)]:hover:text-inverse [@media(hover:hover)]:hover:text-white border-subtlest ring-subtlest divide-subtlest bg-subtle\"><span class=\"relative -mt-px inline-block align-middle max-w-[25ch] overflow-hidden\">microsoft<\/span><span class=\"ml-xs -mt-px mr-px inline-block align-middle\"><span class=\"opacity-50\">+3<\/span><\/span><\/span><\/span><\/a><\/span>\u200b<\/p>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">\u4ed5\u7d44\u307f\u3068\u6d41\u901a<\/h2>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">\u4f9b\u7d66\u5074\u306f\u958b\u767a\u8005\u30fb\u30a2\u30af\u30bb\u30b9\u30d6\u30ed\u30fc\u30ab\u30fc\u30fb\u30a4\u30f3\u30d5\u30e9\u904b\u55b6\u304c\u5206\u696d\u3057\u3001\u30c6\u30ec\u30b0\u30e9\u30e0\u7b49\u3068\u30c0\u30fc\u30af\u30a6\u30a7\u30d6\u5e02\u5834\u3067\u6697\u53f7\u8cc7\u7523\u6c7a\u6e08\u306b\u3088\u308a\u9812\u5e03\u3001\u30b5\u30d6\u30b9\u30af\u66f4\u65b0\u3084\u30b5\u30dd\u30fc\u30c8\u3001\u30a2\u30d5\u30a3\u30ea\u30a8\u30a4\u30c8\u5236\u5ea6\u307e\u3067\u5099\u3048\u307e\u3059\u3002<span class=\"citation inline\" data-state=\"closed\"><a class=\"inline\" href=\"https:\/\/www.techtarget.com\/whatis\/feature\/Cybercrime-as-a-service-explained-What-you-need-to-know\" target=\"_blank\" rel=\"noopener\"><span class=\"relative -mt-px select-none whitespace-nowrap -top-px font-sans text-base text-foreground selection:bg-super\/50 selection:text-foreground dark:selection:bg-super\/10 dark:selection:text-super\"><span class=\"text-3xs rounded-badge group min-w-4 cursor-pointer text-center align-middle font-mono tabular-nums py-[0.1875rem] leading-snug px-[0.3rem] [@media(hover:hover)]:hover:bg-super dark:[@media(hover:hover)]:hover:text-inverse [@media(hover:hover)]:hover:text-white border-subtlest ring-subtlest divide-subtlest bg-subtle\"><span class=\"relative -mt-px inline-block align-middle max-w-[25ch] overflow-hidden\">techtarget<\/span><span class=\"ml-xs -mt-px mr-px inline-block align-middle\"><span class=\"opacity-50\">+1<\/span><\/span><\/span><\/span><\/a><\/span>\u200b<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">\u5546\u54c1\u306f\u300c\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30fb\u30a2\u30ba\u30fb\u30a2\u30fb\u30b5\u30fc\u30d3\u30b9\u300d\u300c\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30fb\u30ad\u30c3\u30c8\u300d\u300cDDoS\u8cc3\u8cb8\u300d\u300c\u30a2\u30af\u30bb\u30b9\u8ca9\u58f2\uff08\u4fb5\u5165\u6e08\u307f\u4f01\u696d\u30cd\u30c3\u30c8\uff09\u300d\u306a\u3069\u3067\u3001\u653b\u6483\u904b\u7528\u306e\u53c2\u5165\u969c\u58c1\u3092\u5927\u5e45\u306b\u4e0b\u3052\u307e\u3059\u3002<span class=\"citation inline\" data-state=\"closed\"><a class=\"inline\" href=\"https:\/\/www.splunk.com\/en_us\/blog\/learn\/cybercrime-as-a-service.html\" target=\"_blank\" rel=\"noopener\"><span class=\"relative -mt-px select-none whitespace-nowrap -top-px font-sans text-base text-foreground selection:bg-super\/50 selection:text-foreground dark:selection:bg-super\/10 dark:selection:text-super\"><span class=\"text-3xs rounded-badge group min-w-4 cursor-pointer text-center align-middle font-mono tabular-nums py-[0.1875rem] leading-snug px-[0.3rem] [@media(hover:hover)]:hover:bg-super dark:[@media(hover:hover)]:hover:text-inverse [@media(hover:hover)]:hover:text-white border-subtlest ring-subtlest divide-subtlest bg-subtle\"><span class=\"relative -mt-px inline-block align-middle max-w-[25ch] overflow-hidden\">splunk<\/span><span class=\"ml-xs -mt-px mr-px inline-block align-middle\"><span class=\"opacity-50\">+1<\/span><\/span><\/span><\/span><\/a><\/span>\u200b<\/p>\n<\/li>\n<\/ul>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u30fb\u30ad\u30c3\u30c8\u306e\u5b9f\u614b<\/h2>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">\u65b0\u3057\u3055\u3084\u30d1\u30c3\u30c1\u6709\u7121\u3067\u4fa1\u683c\u304c\u6c7a\u307e\u308a\u30010-day\u306f\u9ad8\u4fa1\u3001N-day\u3067\u3082\u5b9f\u904b\u7528\u4fa1\u5024\u304c\u3042\u308c\u3070\u6d41\u901a\u3057\u7d9a\u3051\u307e\u3059\u3002<span class=\"citation inline\" data-state=\"closed\" aria-label=\"Trends and Shifts in the Underground N-Day Exploit Market\"><a class=\"inline\" href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/trends-and-shifts-in-the-underground-n-day-exploit-market\" target=\"_blank\" rel=\"noopener\"><span class=\"relative -mt-px select-none whitespace-nowrap -top-px font-sans text-base text-foreground selection:bg-super\/50 selection:text-foreground dark:selection:bg-super\/10 dark:selection:text-super\"><span class=\"text-3xs rounded-badge group min-w-4 cursor-pointer text-center align-middle font-mono tabular-nums py-[0.1875rem] leading-snug px-[0.3rem] [@media(hover:hover)]:hover:bg-super dark:[@media(hover:hover)]:hover:text-inverse [@media(hover:hover)]:hover:text-white border-subtlest ring-subtlest divide-subtlest bg-subtle\"><span class=\"relative -mt-px inline-block align-middle max-w-[25ch] overflow-hidden\">trendmicro<\/span><\/span><\/span><\/a><\/span>\u200b<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">\u8fd1\u5e74\u306f\u300c\u30a2\u30af\u30bb\u30b9\u30fb\u30a2\u30ba\u30fb\u30a2\u30fb\u30b5\u30fc\u30d3\u30b9\u300d\uff08\u4f01\u696d\u306eRDP\/\u30e1\u30fc\u30eb\/EDR\u56de\u907f\u6e08\u307f\u74b0\u5883\u3078\u306e\u30ed\u30b0\u30a4\u30f3\u6a29\uff09\u53f0\u982d\u3067\u3001\u30ad\u30c3\u30c8\u3068\u7d44\u307f\u5408\u308f\u305b\u305f\u521d\u671f\u4fb5\u5165\u306e\u5916\u6ce8\u304c\u4e00\u822c\u5316\u3057\u307e\u3057\u305f\u3002<span class=\"citation inline\" data-state=\"closed\" aria-label=\"Trends and Shifts in the Underground N-Day Exploit Market\"><a class=\"inline\" href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/trends-and-shifts-in-the-underground-n-day-exploit-market\" target=\"_blank\" rel=\"noopener\"><span class=\"relative -mt-px select-none whitespace-nowrap -top-px font-sans text-base text-foreground selection:bg-super\/50 selection:text-foreground dark:selection:bg-super\/10 dark:selection:text-super\"><span class=\"text-3xs rounded-badge group min-w-4 cursor-pointer text-center align-middle font-mono tabular-nums py-[0.1875rem] leading-snug px-[0.3rem] [@media(hover:hover)]:hover:bg-super dark:[@media(hover:hover)]:hover:text-inverse [@media(hover:hover)]:hover:text-white border-subtlest ring-subtlest divide-subtlest bg-subtle\"><span class=\"relative -mt-px inline-block align-middle max-w-[25ch] overflow-hidden\">trendmicro<\/span><\/span><\/span><\/a><\/span>\u200b<\/p>\n<\/li>\n<\/ul>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">\u4f55\u304c\u3067\u304d\u308b\u306e\u304b\uff08\u5229\u7528\u5f62\u614b\uff09<\/h2>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">\u521d\u671f\u4fb5\u5165\u306e\u5916\u6ce8\uff1a\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30fb\u30d6\u30e9\u30a6\u30b6\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u30fb\u8cfc\u5165\u6e08\u307f\u30a2\u30af\u30bb\u30b9\u3067\u8db3\u5834\u3092\u78ba\u4fdd\u3057\u3001\u305d\u306e\u5f8c\u306e\u6a2a\u5c55\u958b\u30fb\u7a83\u53d6\u30fb\u6697\u53f7\u5316\u3092\u5225\u306e\u8acb\u8ca0\u304c\u62c5\u5f53\u3059\u308b\u300c\u653b\u6483\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u300d\u304c\u6210\u7acb\u3002<span class=\"citation inline\" data-state=\"closed\"><a class=\"inline\" href=\"https:\/\/www.splunk.com\/en_us\/blog\/learn\/cybercrime-as-a-service.html\" target=\"_blank\" rel=\"noopener\"><span class=\"relative -mt-px select-none whitespace-nowrap -top-px font-sans text-base text-foreground selection:bg-super\/50 selection:text-foreground dark:selection:bg-super\/10 dark:selection:text-super\"><span class=\"text-3xs rounded-badge group min-w-4 cursor-pointer text-center align-middle font-mono tabular-nums py-[0.1875rem] leading-snug px-[0.3rem] [@media(hover:hover)]:hover:bg-super dark:[@media(hover:hover)]:hover:text-inverse [@media(hover:hover)]:hover:text-white border-subtlest ring-subtlest divide-subtlest bg-subtle\"><span class=\"relative -mt-px inline-block align-middle max-w-[25ch] overflow-hidden\">splunk<\/span><span class=\"ml-xs -mt-px mr-px inline-block align-middle\"><span class=\"opacity-50\">+1<\/span><\/span><\/span><\/span><\/a><\/span>\u200b<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">\u91d1\u92ad\u5316\u306e\u9ad8\u901f\u5316\uff1a\u95c7\u5e02\u5834\u3067\u76d7\u96e3\u30c7\u30fc\u30bf\u306e\u5373\u6642\u73fe\u91d1\u5316\u3001\u30dc\u30c3\u30c8\u30cd\u30c3\u30c8\u3067\u5bc6\u8f38\u30fb\u8a50\u6b3a\u306e\u30aa\u30da\u652f\u63f4\uff08OTP\u56de\u907f\u3001SMS\u7206\u6483\u306a\u3069\uff09\u3001DDoS\u3067\u88ab\u5bb3\u8005\u3092\u4ea4\u6e09\u306b\u8ffd\u3044\u8fbc\u3080\u7b49\u306e\u201c\u7d44\u307f\u5408\u308f\u305b\u6280\u201d\u304c\u666e\u53ca\u3002<span class=\"citation inline\" data-state=\"closed\"><a class=\"inline\" href=\"https:\/\/www.techtarget.com\/whatis\/feature\/Cybercrime-as-a-service-explained-What-you-need-to-know\" target=\"_blank\" rel=\"noopener\"><span class=\"relative -mt-px select-none whitespace-nowrap -top-px font-sans text-base text-foreground selection:bg-super\/50 selection:text-foreground dark:selection:bg-super\/10 dark:selection:text-super\"><span class=\"text-3xs rounded-badge group min-w-4 cursor-pointer text-center align-middle font-mono tabular-nums py-[0.1875rem] leading-snug px-[0.3rem] [@media(hover:hover)]:hover:bg-super dark:[@media(hover:hover)]:hover:text-inverse [@media(hover:hover)]:hover:text-white border-subtlest ring-subtlest divide-subtlest bg-subtle\"><span class=\"relative -mt-px inline-block align-middle max-w-[25ch] overflow-hidden\">techtarget<\/span><span class=\"ml-xs -mt-px mr-px inline-block align-middle\"><span class=\"opacity-50\">+1<\/span><\/span><\/span><\/span><\/a><\/span>\u200b<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">AI\u306e\u5c0e\u5165\uff1a\u8a98\u5c0e\u6587\u9762\u306e\u81ea\u52d5\u751f\u6210\u3001\u591a\u8a00\u8a9e\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u3001\u6a19\u7684\u74b0\u5883\u306e\u81ea\u52d5\u30b9\u30ad\u30e3\u30f3\u3084\u6a29\u9650\u6607\u683c\u306e\u534a\u81ea\u52d5\u5316\u306a\u3069\u3067\u3001\u975e\u719f\u7df4\u8005\u3067\u3082\u9ad8\u5ea6\u653b\u6483\u3092\u904b\u7528\u53ef\u80fd\u306b\u3057\u3066\u3044\u307e\u3059\u3002<span class=\"citation inline\" data-state=\"closed\"><a class=\"inline\" href=\"https:\/\/www.weforum.org\/publications\/global-cybersecurity-outlook-2025\/in-full\/1-understanding-complexity-in-cyberspace-587e8c5eba\/\" target=\"_blank\" rel=\"noopener\"><span class=\"relative -mt-px select-none whitespace-nowrap -top-px font-sans text-base text-foreground selection:bg-super\/50 selection:text-foreground dark:selection:bg-super\/10 dark:selection:text-super\"><span class=\"text-3xs rounded-badge group min-w-4 cursor-pointer text-center align-middle font-mono tabular-nums py-[0.1875rem] leading-snug px-[0.3rem] [@media(hover:hover)]:hover:bg-super dark:[@media(hover:hover)]:hover:text-inverse [@media(hover:hover)]:hover:text-white border-subtlest ring-subtlest divide-subtlest bg-subtle\"><span class=\"relative -mt-px inline-block align-middle max-w-[25ch] overflow-hidden\">weforum<\/span><span class=\"ml-xs -mt-px mr-px inline-block align-middle\"><span class=\"opacity-50\">+1<\/span><\/span><\/span><\/span><\/a><\/span>\u200b<\/p>\n<\/li>\n<\/ul>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">\u30e1\u30ad\u30b7\u30b3\u7cfb\u30ab\u30eb\u30c6\u30eb\u306e\u95a2\u4e0e\u4f8b\u30fb\u6587\u8108<\/h2>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">\u30e1\u30ad\u30b7\u30b3\u306e\u7d44\u7e54\u72af\u7f6a\u306fCaaS\u3067\u300c\u4eba\u6750\u30fb\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u30fb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30a2\u30af\u30bb\u30b9\u300d\u3092\u8cfc\u5165\u3057\u3001\u91d1\u878d\u8a50\u6b3a\u3084\u6050\u559d\u3001\u8cc7\u91d1\u6d17\u6d44\u306e\u652f\u63f4\u306b\u6d3b\u7528\u3057\u3066\u3044\u308b\u3068\u5206\u6790\u3055\u308c\u3066\u3044\u307e\u3059\u3002<span class=\"citation inline\" data-state=\"closed\"><a class=\"inline\" href=\"https:\/\/www.geopoliticalmonitor.com\/why-mexican-cyber-cartels-threaten-u-s-national-security\/\" target=\"_blank\" rel=\"noopener\"><span class=\"relative -mt-px select-none whitespace-nowrap -top-px font-sans text-base text-foreground selection:bg-super\/50 selection:text-foreground dark:selection:bg-super\/10 dark:selection:text-super\"><span class=\"text-3xs rounded-badge group min-w-4 cursor-pointer text-center align-middle font-mono tabular-nums py-[0.1875rem] leading-snug px-[0.3rem] [@media(hover:hover)]:hover:bg-super dark:[@media(hover:hover)]:hover:text-inverse [@media(hover:hover)]:hover:text-white border-subtlest ring-subtlest divide-subtlest bg-subtle\"><span class=\"relative -mt-px inline-block align-middle max-w-[25ch] overflow-hidden\">geopoliticalmonitor<\/span><span class=\"ml-xs -mt-px mr-px inline-block align-middle\"><span class=\"opacity-50\">+1<\/span><\/span><\/span><\/span><\/a><\/span>\u200b<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">2018\u5e74\u306b\u306fBandidos Revolutions Team\u304c\u9280\u884c\u9593\u6c7a\u6e08\u306e\u8106\u5f31\u6027\u3092\u7a81\u3044\u3066\u7d041,520\u4e07\u30c9\u30eb\u3092\u7a83\u53d6\u3057\u305f\u4e8b\u4ef6\u304c\u5831\u3058\u3089\u308c\u3001\u30b5\u30a4\u30d0\u30fc\u72af\u3068TCO\u306e\u878d\u5408\u4e8b\u4f8b\u3068\u3057\u3066\u5f15\u7528\u3055\u308c\u3066\u3044\u307e\u3059\u3002<span class=\"citation inline\" data-state=\"closed\" aria-label=\"Why Mexican Cyber-Cartels Threaten US National Security\"><a class=\"inline\" href=\"https:\/\/www.geopoliticalmonitor.com\/why-mexican-cyber-cartels-threaten-u-s-national-security\/\" target=\"_blank\" rel=\"noopener\"><span class=\"relative -mt-px select-none whitespace-nowrap -top-px font-sans text-base text-foreground selection:bg-super\/50 selection:text-foreground dark:selection:bg-super\/10 dark:selection:text-super\"><span class=\"text-3xs rounded-badge group min-w-4 cursor-pointer text-center align-middle font-mono tabular-nums py-[0.1875rem] leading-snug px-[0.3rem] [@media(hover:hover)]:hover:bg-super dark:[@media(hover:hover)]:hover:text-inverse [@media(hover:hover)]:hover:text-white border-subtlest ring-subtlest divide-subtlest bg-subtle\"><span class=\"relative -mt-px inline-block align-middle max-w-[25ch] overflow-hidden\">geopoliticalmonitor<\/span><\/span><\/span><\/a><\/span>\u200b<\/p>\n<\/li>\n<\/ul>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">\u306a\u305c\u5e83\u304c\u308b\u304b<\/h2>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">\u53d6\u5f15\u306f\u533f\u540d\u6027\u306e\u9ad8\u3044\u6697\u53f7\u8cc7\u7523\u3067\u3001\u30ea\u30fc\u30af\u30b5\u30a4\u30c8\u3084\u5e02\u5834\u306e\u5206\u6563\u3067\u6458\u767a\u306b\u8010\u6027\u304c\u3042\u308a\u3001\u5f53\u5c40\u306e\u5927\u898f\u6a21\u6458\u767a\u5f8c\u3082\u65b0\u8208\u5e02\u5834\u3078\u3059\u3050\u518d\u7de8\u3055\u308c\u307e\u3059\u3002<span class=\"citation inline\" data-state=\"closed\"><a class=\"inline\" href=\"https:\/\/deepstrike.io\/blog\/top-dark-web-marketplaces-2025\" target=\"_blank\" rel=\"noopener\"><span class=\"relative -mt-px select-none whitespace-nowrap -top-px font-sans text-base text-foreground selection:bg-super\/50 selection:text-foreground dark:selection:bg-super\/10 dark:selection:text-super\"><span class=\"text-3xs rounded-badge group min-w-4 cursor-pointer text-center align-middle font-mono tabular-nums py-[0.1875rem] leading-snug px-[0.3rem] [@media(hover:hover)]:hover:bg-super dark:[@media(hover:hover)]:hover:text-inverse [@media(hover:hover)]:hover:text-white border-subtlest ring-subtlest divide-subtlest bg-subtle\"><span class=\"relative -mt-px inline-block align-middle max-w-[25ch] overflow-hidden\">deepstrike<\/span><span class=\"ml-xs -mt-px mr-px inline-block align-middle\"><span class=\"opacity-50\">+1<\/span><\/span><\/span><\/span><\/a><\/span>\u200b<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u5316\u306b\u3088\u308a\u3001\u5c02\u9580\u6027\u306e\u5206\u696d\u3068\u30ea\u30b9\u30af\u8ee2\u5ac1\u304c\u53ef\u80fd\u306b\u306a\u308a\u3001\u653b\u6483\u306e\u30b3\u30b9\u30c8\u4f4e\u4e0b\u3068\u30b9\u30d4\u30fc\u30c9\u5411\u4e0a\u304c\u9032\u307f\u307e\u3059\u3002<span class=\"citation inline\" data-state=\"closed\"><a class=\"inline\" href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/threat-predictions-for-2025-get-ready-for-bigger-bolder-attacks\" target=\"_blank\" rel=\"noopener\"><span class=\"relative -mt-px select-none whitespace-nowrap -top-px font-sans text-base text-foreground selection:bg-super\/50 selection:text-foreground dark:selection:bg-super\/10 dark:selection:text-super\"><span class=\"text-3xs rounded-badge group min-w-4 cursor-pointer text-center align-middle font-mono tabular-nums py-[0.1875rem] leading-snug px-[0.3rem] [@media(hover:hover)]:hover:bg-super dark:[@media(hover:hover)]:hover:text-inverse [@media(hover:hover)]:hover:text-white border-subtlest ring-subtlest divide-subtlest bg-subtle\"><span class=\"relative -mt-px inline-block align-middle max-w-[25ch] overflow-hidden\">fortinet<\/span><span class=\"ml-xs -mt-px mr-px inline-block align-middle\"><span class=\"opacity-50\">+1<\/span><\/span><\/span><\/span><\/a><\/span>\u200b<\/p>\n<\/li>\n<\/ul>\n<h2 class=\"mb-2 mt-4 font-display font-semimedium text-base first:mt-0\">\u9632\u5fa1\u5074\u306e\u8981\u70b9<\/h2>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">\u521d\u671f\u4fb5\u5165\u306e\u4e3b\u8981\u30eb\u30fc\u30c8\uff08\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u3001\u516c\u958b\u30b5\u30fc\u30d3\u30b9\u8106\u5f31\u6027\u3001VPN\u6a5f\u5668\u30fbM365\u30fbSSO\u306e\u8a8d\u8a3c\u56de\u308a\uff09\u3092\u60f3\u5b9a\u3057\u3001\u30d1\u30c3\u30c1\u306e\u8fc5\u901f\u9069\u7528\u3068\u8106\u5f31\u6027\u512a\u5148\u5ea6\u4ed8\u3051\u3001MFA\u306e\u9069\u6b63\u5316\u3001\u7279\u6a29\u30a2\u30ab\u30a6\u30f3\u30c8\u5206\u96e2\u304c\u524d\u63d0\u3067\u3059\u3002<span class=\"citation inline\" data-state=\"closed\"><a class=\"inline\" href=\"https:\/\/www.fortinet.com\/corporate\/about-us\/newsroom\/press-releases\/2025\/fortinet-threat-report-reveals-record-surge-in-automated-cyberattacks\" target=\"_blank\" rel=\"noopener\"><span class=\"relative -mt-px select-none whitespace-nowrap -top-px font-sans text-base text-foreground selection:bg-super\/50 selection:text-foreground dark:selection:bg-super\/10 dark:selection:text-super\"><span class=\"text-3xs rounded-badge group min-w-4 cursor-pointer text-center align-middle font-mono tabular-nums py-[0.1875rem] leading-snug px-[0.3rem] [@media(hover:hover)]:hover:bg-super dark:[@media(hover:hover)]:hover:text-inverse [@media(hover:hover)]:hover:text-white border-subtlest ring-subtlest divide-subtlest bg-subtle\"><span class=\"relative -mt-px inline-block align-middle max-w-[25ch] overflow-hidden\">fortinet<\/span><span class=\"ml-xs -mt-px mr-px inline-block align-middle\"><span class=\"opacity-50\">+1<\/span><\/span><\/span><\/span><\/a><\/span>\u200b<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">\u30a2\u30af\u30bb\u30b9\u8ca9\u58f2\u5bfe\u7b56\u3068\u3057\u3066\u3001\u7570\u5e38\u8a8d\u8a3c\u691c\u77e5\u3001IP\u8a55\u5224\u30fbImpossible Travel\u3001\u7d71\u5408\u30ed\u30b0\u76e3\u8996\u3001\u95c7\u5e02\u5834\u76e3\u8996\uff08\u30af\u30ec\u30c7\u30f3\u30b7\u30e3\u30eb\u6d41\u51fa\u306e\u65e9\u671f\u691c\u77e5\uff09\u3092\u7d44\u307f\u5408\u308f\u305b\u307e\u3059\u3002<span class=\"citation inline\" data-state=\"closed\"><a class=\"inline\" href=\"https:\/\/www.cyber.gc.ca\/en\/guidance\/national-cyber-threat-assessment-2025-2026\" target=\"_blank\" rel=\"noopener\"><span class=\"relative -mt-px select-none whitespace-nowrap -top-px font-sans text-base text-foreground selection:bg-super\/50 selection:text-foreground dark:selection:bg-super\/10 dark:selection:text-super\"><span class=\"text-3xs rounded-badge group min-w-4 cursor-pointer text-center align-middle font-mono tabular-nums py-[0.1875rem] leading-snug px-[0.3rem] [@media(hover:hover)]:hover:bg-super dark:[@media(hover:hover)]:hover:text-inverse [@media(hover:hover)]:hover:text-white border-subtlest ring-subtlest divide-subtlest bg-subtle\"><span class=\"relative -mt-px inline-block align-middle max-w-[25ch] overflow-hidden\">cyber<\/span><span class=\"ml-xs -mt-px mr-px inline-block align-middle\"><span class=\"opacity-50\">+1<\/span><\/span><\/span><\/span><\/a><\/span>\u200b<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">\u30e9\u30f3\u30b5\u30e0RaaS\u5bfe\u7b56\u306f\u30d0\u30c3\u30af\u30a2\u30c3\u30d7\u306e\u5206\u96e2\u30fb\u6f14\u7fd2\u3001EDR\u306e\u904b\u7528\u4e00\u8cab\u6027\u3001DDoS\u7de9\u548c\u30b5\u30fc\u30d3\u30b9\u6e96\u5099\u3001\u652f\u6255\u3044\u53ef\u5426\u306e\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u7b56\u5b9a\u304c\u6709\u52b9\u3067\u3059\u3002<span class=\"citation inline\" data-state=\"closed\"><a class=\"inline\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/what-is-caas\/\" target=\"_blank\" rel=\"noopener\"><span class=\"relative -mt-px select-none whitespace-nowrap -top-px font-sans text-base text-foreground selection:bg-super\/50 selection:text-foreground dark:selection:bg-super\/10 dark:selection:text-super\"><span class=\"text-3xs rounded-badge group min-w-4 cursor-pointer text-center align-middle font-mono tabular-nums py-[0.1875rem] leading-snug px-[0.3rem] [@media(hover:hover)]:hover:bg-super dark:[@media(hover:hover)]:hover:text-inverse [@media(hover:hover)]:hover:text-white border-subtlest ring-subtlest divide-subtlest bg-subtle\"><span class=\"relative -mt-px inline-block align-middle max-w-[25ch] overflow-hidden\">microsoft<\/span><span class=\"ml-xs -mt-px mr-px inline-block align-middle\"><span class=\"opacity-50\">+1<\/span><\/span><\/span><\/span><\/a><\/span>\u200b<\/p>\n<\/li>\n<\/ul>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">\u5275\u4f5c\u3078\u306e\u793a\u5506<\/p>\n<ul class=\"marker:text-quiet list-disc\">\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">\u300c\u30b5\u30d6\u30b9\u30af\u3067\u201c\u4fb5\u5165\u201d\u3092\u8cb7\u3046\u300d\u793e\u4f1a\uff1a\u72af\u884c\u304c\u5206\u696d\u306e\u30af\u30ea\u30c3\u30af\u64cd\u4f5c\u306b\u9084\u5143\u3055\u308c\u3001\u4eba\u9593\u306e\u60aa\u610f\u304cUI\u306b\u6eb6\u3051\u308b\u611f\u899a\u3002<span class=\"citation inline\" data-state=\"closed\"><a class=\"inline\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/what-is-caas\/\" target=\"_blank\" rel=\"noopener\"><span class=\"relative -mt-px select-none whitespace-nowrap -top-px font-sans text-base text-foreground selection:bg-super\/50 selection:text-foreground dark:selection:bg-super\/10 dark:selection:text-super\"><span class=\"text-3xs rounded-badge group min-w-4 cursor-pointer text-center align-middle font-mono tabular-nums py-[0.1875rem] leading-snug px-[0.3rem] [@media(hover:hover)]:hover:bg-super dark:[@media(hover:hover)]:hover:text-inverse [@media(hover:hover)]:hover:text-white border-subtlest ring-subtlest divide-subtlest bg-subtle\"><span class=\"relative -mt-px inline-block align-middle max-w-[25ch] overflow-hidden\">microsoft<\/span><span class=\"ml-xs -mt-px mr-px inline-block align-middle\"><span class=\"opacity-50\">+1<\/span><\/span><\/span><\/span><\/a><\/span>\u200b<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">\u300c\u53e4\u3044\u6b20\u9665\u306e\u4ea1\u970a\u300d\uff1a20\u5e74\u524d\u306e\u8106\u5f31\u6027\u3055\u3048\u8ca8\u5e63\u4fa1\u5024\u3092\u6301\u3061\u7d9a\u3051\u3001\u904e\u53bb\u304c\u73fe\u5728\u3092\u63fa\u3059\u308b\u5730\u4e0b\u5e02\u5834\u306e\u6642\u9593\u611f\u899a\u3002<span class=\"citation inline\" data-state=\"closed\" aria-label=\"Trends and Shifts in the Underground N-Day Exploit Market\"><a class=\"inline\" href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/trends-and-shifts-in-the-underground-n-day-exploit-market\" target=\"_blank\" rel=\"noopener\"><span class=\"relative -mt-px select-none whitespace-nowrap -top-px font-sans text-base text-foreground selection:bg-super\/50 selection:text-foreground dark:selection:bg-super\/10 dark:selection:text-super\"><span class=\"text-3xs rounded-badge group min-w-4 cursor-pointer text-center align-middle font-mono tabular-nums py-[0.1875rem] leading-snug px-[0.3rem] [@media(hover:hover)]:hover:bg-super dark:[@media(hover:hover)]:hover:text-inverse [@media(hover:hover)]:hover:text-white border-subtlest ring-subtlest divide-subtlest bg-subtle\"><span class=\"relative -mt-px inline-block align-middle max-w-[25ch] overflow-hidden\">trendmicro<\/span><\/span><\/span><\/a><\/span>\u200b<\/p>\n<\/li>\n<li class=\"py-0 my-0 prose-p:pt-0 prose-p:mb-2 prose-p:my-0 [&amp;&gt;p]:pt-0 [&amp;&gt;p]:mb-2 [&amp;&gt;p]:my-0\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">\u300c\u518d\u751f\u3059\u308b\u5e02\u5834\u300d\uff1a\u5927\u898f\u6a21\u6458\u767a\u306e\u7fcc\u65e5\u306b\u306f\u65b0\u540d\u7fa9\u306e\u5e02\u5834\u304c\u7acb\u3061\u4e0a\u304c\u308b\u3001\u5e38\u5728\u6226\u5834\u306e\u7d4c\u6e08\u751f\u614b\u7cfb\u751f\u614b\u7cfb\u3002<span class=\"citation inline\" data-state=\"closed\"><a class=\"inline\" href=\"https:\/\/www.visionofhumanity.org\/mexicos-organised-criminal-landscape-2025\/\" target=\"_blank\" rel=\"noopener\"><span class=\"relative -mt-px select-none whitespace-nowrap -top-px font-sans text-base text-foreground selection:bg-super\/50 selection:text-foreground dark:selection:bg-super\/10 dark:selection:text-super\"><span class=\"text-3xs rounded-badge group min-w-4 cursor-pointer text-center align-middle font-mono tabular-nums py-[0.1875rem] leading-snug px-[0.3rem] [@media(hover:hover)]:hover:bg-super dark:[@media(hover:hover)]:hover:text-inverse [@media(hover:hover)]:hover:text-white border-subtlest ring-subtlest divide-subtlest bg-subtle\"><span class=\"relative -mt-px inline-block align-middle max-w-[25ch] overflow-hidden\">visionofhumanity<\/span><span class=\"ml-xs -mt-px mr-px inline-block align-middle\"><span class=\"opacity-50\">+1<\/span><\/span><\/span><\/span><\/a><\/span>\u200b<\/p>\n<\/li>\n<\/ul>\n<\/div>\n<ol>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/what-is-caas\/\">https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/what-is-caas\/<\/a><\/li>\n<li><a href=\"https:\/\/www.splunk.com\/en_us\/blog\/learn\/cybercrime-as-a-service.html\">https:\/\/www.splunk.com\/en_us\/blog\/learn\/cybercrime-as-a-service.html<\/a><\/li>\n<li><a href=\"https:\/\/www.unodc.org\/roseap\/uploads\/documents\/Publications\/2025\/UNODC_Report_Emerging_threats_-_The_intersection_of_criminal_and_technological_innovation_in_the_use_of_automation_and_AI.pdf\">https:\/\/www.unodc.org\/roseap\/uploads\/documents\/Publications\/2025\/UNODC_Report_Emerging_threats_-_The_intersection_of_criminal_and_technological_innovation_in_the_use_of_automation_and_AI.pdf<\/a><\/li>\n<li><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/trends-and-shifts-in-the-underground-n-day-exploit-market\">https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/trends-and-shifts-in-the-underground-n-day-exploit-market<\/a><\/li>\n<li><a href=\"https:\/\/www.techtarget.com\/whatis\/feature\/Cybercrime-as-a-service-explained-What-you-need-to-know\">https:\/\/www.techtarget.com\/whatis\/feature\/Cybercrime-as-a-service-explained-What-you-need-to-know<\/a><\/li>\n<li><a href=\"https:\/\/www.weforum.org\/publications\/global-cybersecurity-outlook-2025\/in-full\/1-understanding-complexity-in-cyberspace-587e8c5eba\/\">https:\/\/www.weforum.org\/publications\/global-cybersecurity-outlook-2025\/in-full\/1-understanding-complexity-in-cyberspace-587e8c5eba\/<\/a><\/li>\n<li><a href=\"https:\/\/www.geopoliticalmonitor.com\/why-mexican-cyber-cartels-threaten-u-s-national-security\/\">https:\/\/www.geopoliticalmonitor.com\/why-mexican-cyber-cartels-threaten-u-s-national-security\/<\/a><\/li>\n<li><a href=\"https:\/\/www.afcea.org\/signal-media\/cyber-edge\/fueling-cartels-cybercrime\">https:\/\/www.afcea.org\/signal-media\/cyber-edge\/fueling-cartels-cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/deepstrike.io\/blog\/top-dark-web-marketplaces-2025\">https:\/\/deepstrike.io\/blog\/top-dark-web-marketplaces-2025<\/a><\/li>\n<li><a href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/cybercrime-service-takedown-7-arrested\">https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/cybercrime-service-takedown-7-arrested<\/a><\/li>\n<li><a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/threat-predictions-for-2025-get-ready-for-bigger-bolder-attacks\">https:\/\/www.fortinet.com\/blog\/threat-research\/threat-predictions-for-2025-get-ready-for-bigger-bolder-attacks<\/a><\/li>\n<li><a href=\"https:\/\/www.fortinet.com\/corporate\/about-us\/newsroom\/press-releases\/2025\/fortinet-threat-report-reveals-record-surge-in-automated-cyberattacks\">https:\/\/www.fortinet.com\/corporate\/about-us\/newsroom\/press-releases\/2025\/fortinet-threat-report-reveals-record-surge-in-automated-cyberattacks<\/a><\/li>\n<li><a href=\"https:\/\/www.cyber.gc.ca\/en\/guidance\/national-cyber-threat-assessment-2025-2026\">https:\/\/www.cyber.gc.ca\/en\/guidance\/national-cyber-threat-assessment-2025-2026<\/a><\/li>\n<li><a href=\"https:\/\/cpl.thalesgroup.com\/blog\/encryption\/cybercrime-as-a-service-caas-explaned\">https:\/\/cpl.thalesgroup.com\/blog\/encryption\/cybercrime-as-a-service-caas-explaned<\/a><\/li>\n<li><a href=\"https:\/\/nordstellar.com\/blog\/cybercrime-as-a-service\/\">https:\/\/nordstellar.com\/blog\/cybercrime-as-a-service\/<\/a><\/li>\n<li><a href=\"https:\/\/brandefense.io\/blog\/cybercrime-as-a-service-caas-how-the-dark-web-is-shaping-modern-attacks\/\">https:\/\/brandefense.io\/blog\/cybercrime-as-a-service-caas-how-the-dark-web-is-shaping-modern-attacks\/<\/a><\/li>\n<li><a href=\"https:\/\/www.visionofhumanity.org\/mexicos-organised-criminal-landscape-2025\/\">https:\/\/www.visionofhumanity.org\/mexicos-organised-criminal-landscape-2025\/<\/a><\/li>\n<li><a href=\"https:\/\/deepstrike.io\/blog\/dark-web-statistics-2025\">https:\/\/deepstrike.io\/blog\/dark-web-statistics-2025<\/a><\/li>\n<li><a href=\"https:\/\/digitalcommons.unomaha.edu\/cgi\/viewcontent.cgi?article=1057&amp;context=criminaljusticefacpub\">https:\/\/digitalcommons.unomaha.edu\/cgi\/viewcontent.cgi?article=1057&amp;context=criminaljusticefacpub<\/a><\/li>\n<li><a href=\"https:\/\/jia.sipa.columbia.edu\/news\/organized-crime-mexico-and-united-states-fighting-two-problems\">https:\/\/jia.sipa.columbia.edu\/news\/organized-crime-mexico-and-united-states-fighting-two-problems<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>CaaS\uff08Cybercrime-as-a-Service\uff09\u306f\u3001\u95c7\u5e02\u5834\u306e\u300cSaaS\u5316\u300d\u3067\u3059\u3002\u30de\u30eb\u30a6\u30a7\u30a2\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3001DDoS\u3001\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u3001\u30dc\u30c3\u30c8\u30cd\u30c3\u30c8\u3001\u8106\u5f31\u6027\u60aa\u7528\uff08\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\uff09\u3084\u4fb5\u5165\u6e08\u307f\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3078\u306e\u30a2\u30af\u30bb\u30b9\u307e &hellip; <a href=\"https:\/\/blog.yoshisuke.com\/?p=2925\" class=\"more-link\"><span class=\"screen-reader-text\">&#8220;CaaS\uff08Cybercrime-as-a-Service\uff09\u306f\u3001\u95c7\u5e02\u5834\u306e\u300cSaaS\u5316\u300d&#8221; \u306e<\/span>\u7d9a\u304d\u3092\u8aad\u3080<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[65,66],"tags":[],"class_list":["post-2925","post","type-post","status-publish","format-standard","hentry","category-ai","category-qb"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blog.yoshisuke.com\/index.php?rest_route=\/wp\/v2\/posts\/2925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.yoshisuke.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.yoshisuke.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.yoshisuke.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.yoshisuke.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2925"}],"version-history":[{"count":2,"href":"https:\/\/blog.yoshisuke.com\/index.php?rest_route=\/wp\/v2\/posts\/2925\/revisions"}],"predecessor-version":[{"id":2927,"href":"https:\/\/blog.yoshisuke.com\/index.php?rest_route=\/wp\/v2\/posts\/2925\/revisions\/2927"}],"wp:attachment":[{"href":"https:\/\/blog.yoshisuke.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.yoshisuke.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2925"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.yoshisuke.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}