Patch CVE-2023-23397 Immediately: What You Need To Know and Do

Patch CVE-2023-23397 Immediately: What You Need To Know and Do

How is CVE-2023-23397 exploited? The attacker sends a message to the victim with an extended Message Application Program Interface (MAPI) property with a Universal Naming Convention (UNC) path to a remote attacker-controlled Server Message Block (SMB, via TCP 445). Share-hosted on a server controlled by the attacker, the vulnerability is exploited whether the recipient has seen the message or not. The attacker remotely sends a malicious calendar invite represented by .msg — the message format…

Read More

Pwn2Own Vancouver 2023 to Put Tesla to the Test

Pwn2Own Vancouver 2023 to Put Tesla to the Test

At Trend Micro, we’ve always said that cybersecurity is a team sport. But what happens when you put those teams in competition with each other? We believe you create the conditions in which the world’s best hackers thrive. And ultimately, you make the connected world safer in the process. That’s the philosophy of our Zero Day Initiative’s Pwn2Own competition. For the past 15+ years, teams from across the globe have battled each other for big…

Read More

3 Ways to Evolve Your Cybersecurity Operations

3 Ways to Evolve Your Cybersecurity Operations

What SOC teams need most are better ways to correlate and prioritize alerts so they can isolate the ones that truly matter while getting in front of threats instead of reacting to them. They also need to streamline their toolsets so they can manage more effectively. As a result, optimizing XDR, assessing risk continuously and shifting away from point solutions are critical. Step 1: Optimize XDR for stronger cybersecurity operations Most cybersecurity operations teams rely…

Read More

Establishing a Proactive Cybersecurity Plan

Establishing a Proactive Cybersecurity Plan

A recent survey with Sapio Research has revealed that 73% of respondents were concerned about the size of their digital attack surface. This overwhelming reaction to the current state of cyber threats affecting organizations is based upon a single fact: remote work. Due to expansions in WFA (work-from-anywhere) labor forces and organizational cloud services, the reality of being exposed to a cyberattack has migrated from “if” to “when.” This has ushered in a need for…

Read More

2022 Review: Trend Transforms to SaaS Cybersecurity

2022 Review: Trend Transforms to SaaS Cybersecurity

2022 Review: Trend Transforms to SaaS Cybersecurity Cyber Threats Transformation to a SaaS-based cybersecurity vendor By: Lonny Huffar February 24, 2023 Read time:  ( words) Welcome to Trend Micro 3.0! What’s that you say? Trend Micro is a leader in the cyber security market and not just an Anti-malware company? Shocker for some of you I know, but we believe our acknowledgment and recognition from Gartner, Forrester and AWS say just that. If you haven’t…

Read More

Lower Data Breach Insurance Costs with These Tips

Lower Data Breach Insurance Costs with These Tips

The proliferation of ransomware and business email compromise (BEC) cyberattacks has forced organizations to change their perception towards the current threat environment. The question is no longer “if” your business will fall victim to a threat campaign, it’s now a matter of “when.” IBM Security reported that 83% of organizations studied have had more than one data breach. While the average cost of a data breach has reached an all-time high of USD 4.35 million…

Read More

Ransomware Revolution: 4 Types of Cyber Risks in 2023

Ransomware Revolution: 4 Types of Cyber Risks in 2023

Security leaders and CISOs have been protecting their organizations from ransomware for decades, adapting with changes in technology to defend against the costly risks of stolen data or interruptions to critical systems. But adversaries always have new tricks up their sleeves and now the global community of ransomware groups seems poised for a revolution that could make them more effective, versatile, and dangerous. How will ransomware’s business model change? The kill chain employed by ransomware…

Read More

Cloud-ready and Channel-first

Cloud-ready and Channel-first

Trend Micro is a cloud security pioneer. And for over 30 years, we’ve worked hand in hand with the channel to make the digital world a safer place. So we’re delighted to receive more recognition of the value we’re adding for partners and customers with the release of the latest CRN Cloud 100 list. This comes on the heels of another great recognition as Trend Micro was recently awarded the AWS Marketplace Partner of the…

Read More

6 Ransomware Trends & Evolutions For 2023

6 Ransomware Trends & Evolutions For 2023

More than any other industry, cybersecurity is constantly changing. But the number of major paradigm shifts that transformed the world of cybersecurity in the past few years has been unprecedented, especially when it comes to combating ransomware. The costly and global threat of ransomware has evolved alongside changing technology in the past two decades. Just as threat researchers and engineers rethink their solutions when the currents of cybersecurity shift, their adversaries are always following the…

Read More

Monthly Threat Webinar Series in 2023: What to Expect

Monthly Threat Webinar Series in 2023: What to Expect

2023 will be the ninth year of doing my monthly threat webinar series that I love.  Each month I select a threat or a research report to discuss with my audience that I think can help educate them on the latest trends in the threat landscape.  Over the years, I’ve covered such threats as advanced persistent threats (APT), botnets, crypto mining, fileless, key loggers, messaging, ransomware, spyware, trojans, vulnerabilities, web threats, and zero days.  One…

Read More
1 2 3 4 5 6 18