Unpacking the Structure of Modern Cybercrime Organizations

Unpacking the Structure of Modern Cybercrime Organizations

The last 20 years have seen the cyberthreat landscape transform markedly: From an era of cyberattacks with damaging payloads, the cybercrime space has evolved to one where malicious actors have organized themselves into groups, mainly driven by financial gain. Consequently, organizations now contend with a new breed of cybercriminals fiercely competing among themselves to claim a bigger stake in a highly lucrative market. Given present circumstances, malicious actors have organized themselves in ways that show…

Read More

Stay Ahead of Cyber Threats

Stay Ahead of Cyber Threats

Trend Micro serves over half a million corporate customers across the globe, including eight of the top 10 telecom firms. Many of these customers are among the world’s largest organizations – running some of the most demanding IT environments on the planet. They need industry-leading threat protection, detection, and response capabilities to work at high speed and scale. That’s why we recently enhanced our TX product line of high-performance appliances with the 9200TXE. As attack…

Read More

Fight Mercenaries with these Cybersecurity Principles

Fight Mercenaries with these Cybersecurity Principles

On March 27, 2023, the Cybersecurity Tech Accord (CTA) released a new set of principles to help guide the technology industry and others in dealing with the growing market of cyber mercenaries. Trend Micro was a co-author of these principles, bringing our expertise and research of cyber mercenaries to help craft these principles for the industry. Trend Micro is one of the founding members of the CTA, and we worked with other members, Cisco, META,…

Read More

Azure Serverless Security Risks Exposed by New Study

Azure Serverless Security Risks Exposed by New Study

Serverless architectures are increasingly popular, as the cloud provider does most of the heavy lifting, allowing developers to focus on building and running their apps. But this popularity has attracted the scrutiny of threat actors. Although serverless environments have a relatively reduced attack surface, with certain responsibilities shifted to the cloud provider (CSP), users must be careful not to introduce extra risk. This could happen if they write insecure code, misconfigure assets or fail to…

Read More

Earth Preta’s Cyberespionage Campaign Hits Over 200

Earth Preta’s Cyberespionage Campaign Hits Over 200

This mix of traditional intelligence trade craft and cyber techniques could mean that these groups have access to advanced resources and support from nation states, since such techniques are not typically available to independent hackers. Moreover, this approach could signify the growing convergence of cyber- and physical security as cyberattacks continue to move beyond digital systems and into the physical world. Operation groups While this is not a comprehensive list, we summarize and attribute the…

Read More

Patch CVE-2023-23397 Immediately: What You Need To Know and Do

Patch CVE-2023-23397 Immediately: What You Need To Know and Do

How is CVE-2023-23397 exploited? The attacker sends a message to the victim with an extended Message Application Program Interface (MAPI) property with a Universal Naming Convention (UNC) path to a remote attacker-controlled Server Message Block (SMB, via TCP 445). Share-hosted on a server controlled by the attacker, the vulnerability is exploited whether the recipient has seen the message or not. The attacker remotely sends a malicious calendar invite represented by .msg — the message format…

Read More

Pwn2Own Vancouver 2023 to Put Tesla to the Test

Pwn2Own Vancouver 2023 to Put Tesla to the Test

At Trend Micro, we’ve always said that cybersecurity is a team sport. But what happens when you put those teams in competition with each other? We believe you create the conditions in which the world’s best hackers thrive. And ultimately, you make the connected world safer in the process. That’s the philosophy of our Zero Day Initiative’s Pwn2Own competition. For the past 15+ years, teams from across the globe have battled each other for big…

Read More

3 Ways to Evolve Your Cybersecurity Operations

3 Ways to Evolve Your Cybersecurity Operations

What SOC teams need most are better ways to correlate and prioritize alerts so they can isolate the ones that truly matter while getting in front of threats instead of reacting to them. They also need to streamline their toolsets so they can manage more effectively. As a result, optimizing XDR, assessing risk continuously and shifting away from point solutions are critical. Step 1: Optimize XDR for stronger cybersecurity operations Most cybersecurity operations teams rely…

Read More

Establishing a Proactive Cybersecurity Plan

Establishing a Proactive Cybersecurity Plan

A recent survey with Sapio Research has revealed that 73% of respondents were concerned about the size of their digital attack surface. This overwhelming reaction to the current state of cyber threats affecting organizations is based upon a single fact: remote work. Due to expansions in WFA (work-from-anywhere) labor forces and organizational cloud services, the reality of being exposed to a cyberattack has migrated from “if” to “when.” This has ushered in a need for…

Read More

2022 Review: Trend Transforms to SaaS Cybersecurity

2022 Review: Trend Transforms to SaaS Cybersecurity

2022 Review: Trend Transforms to SaaS Cybersecurity Cyber Threats Transformation to a SaaS-based cybersecurity vendor By: Lonny Huffar February 24, 2023 Read time:  ( words) Welcome to Trend Micro 3.0! What’s that you say? Trend Micro is a leader in the cyber security market and not just an Anti-malware company? Shocker for some of you I know, but we believe our acknowledgment and recognition from Gartner, Forrester and AWS say just that. If you haven’t…

Read More
1 2 3 4 5 6 19