Global Cyberattacks: Managing Risk in Chaotic Times

Global Cyberattacks: Managing Risk in Chaotic Times

Global Cyberattacks: Managing Risk in Chaotic Times Risk Management As global tension rises, cyber-risk management and security fundamentals are the key to cyber-resilience By: Trend Micro February 24, 2022 Read time:  ( words) While it seems almost cliché now, we are living in unprecedented times. The global pandemic has forced organizations everywhere to deal not only with health and supply-chain challenges, but also with increasing political turmoil that can negatively impact ongoing operations. And with…

Read More

Global Cyberattacks: How to Manage Risk in Times of Chaos

Global Cyberattacks: Managing Risk in Chaotic Times

Global Cyberattacks: How to Manage Risk in Times of Chaos Cyber Threats As global tension rises, cyber-risk management and security fundamentals are the key to cyber-resilience. 5 best practices are presented to manage your cyber risk. By: Trend Micro February 24, 2022 Read time:  ( words) While it seems almost cliché now, we are living in unprecedented times. The global pandemic has forced organizations everywhere to deal not only with health and supply-chain challenges, but…

Read More

This Week in Security News – February 18, 2022

This Week in Security News – February 18, 2022

Read on:  SMS PVA Services’ Use of Infected Android Phones Reveals Flaws in SMS Verification There has been an increase in short message service (SMS) phone-verified account (PVA) services in the last two years. SMS PVA services provide alternative mobile numbers that customers can use to register for online services and platforms. Malicious actors can register disposable accounts in bulk or create phone-verified accounts for criminal activities. In the following blog, Trend Micro shares the…

Read More

Ukraine Cyberattack 2022: Geopolitical Cybersecurity

Ukraine Cyberattack 2022: Geopolitical Cybersecurity

Europe is on a knife-edge. With over 130,000 Russian troops amassed on the Ukrainian border, the region is witnessing the biggest build-up of firepower since the cold war. Inevitably, there is also cyber-dimension to this conflict. Mounting attacks on Ukrainian websites and I.T. infrastructure are making policymakers in Washington and elsewhere nervous should tensions rise further. All of this comes amidst unprecedented US-Russian cooperation to crack down on organized cybercrime. However, CISOs should be clear:…

Read More

3 Cybersecurity Trends & Mitigation Strategies

3 Cybersecurity Trends & Mitigation Strategies

We’ve also seen an increase in “living off the land” attacks where cybercriminals leverage legitimate tools within an enterprise’s network to avoid detection before exfiltrating data. These attacks usually occur during working hours to seem more legitimate. Lastly, Bitcoin has become seemingly integral to ransomware. It’s anonymous, difficult to track, fast, and easy. What more could a bad guy want? It’s no wonder the amount of cryptocurrency funds from ransomware skyrocketed 311% from 2019 to…

Read More

This Week in Security News – February 11, 2022

This Week in Security News – February 18, 2022

Read on:  Hidden Scams in Malicious Scans: How to Use QR Codes Safely The practical approach to life after COVID-19 is for people to learn to live with it and do what they can to manage it. One of the things that is likely to remain for the foreseeable future is the need for cashless and no-contact transactions. Many businesses have responded to this need through the use of quick response (QR) codes, however threats…

Read More

CNAPP Security: Cloud Native Application Protection Platform

CNAPP Security: Cloud Native Application Protection Platform

According to Gartner, manual integration is the most common method of integrating different security tools to streamline DevOps. By consolidating capabilities, security teams are freed from manual correlation and investigation between several, disparate point products. And comprehensive visibility leads to better identification, assessment, prioritization, and adaptation to risks in cloud native applications. Ok, good for them, you may be thinking, but how does this help me? DevOps and CNAPP Think of it this way: the…

Read More

This Week in Security News – February 4th, 2022

This Week in Security News – February 18, 2022

Read on:  The Samba Vulnerability: What is CVE-2021-44142 and How to Fix It An earlier version of an out-of-bounds (OOB) vulnerability in Samba was disclosed via Trend Micro Zero Day Initiative’s (ZDI) Pwn2Own Austin 2021. While we have not seen any active attacks exploiting this vulnerability, CVE-2021-44142 received a CVSS rating of 9.9 out of the three variants reported. If abused, this security gap can be used by remote attackers to execute arbitrary code as…

Read More

How to Use Zero Trust Security for the Hybrid Cloud

How to Use Zero Trust Security for the Hybrid Cloud

Applying a zero trust approach to DevOps processes is critical to ensuring secure apps. Especially considering some parts of the part are built in-house, other components use tech purchased or leased from other vendors, and some of it is composed of open source code. The software supply chain must be protected by authenticating users’ credentials, continuously monitoring the network and user behavior, and vetting any third-party or open source technology brought on board. Will all…

Read More

This Week in Security News – January 28th, 2022

This Week in Security News – February 18, 2022

Read on: Codex Exposed Task Automation and Response Consistency In this blog series, Trend Micro explores different aspects of Codex and assess its capabilities with a focus on the security aspects that affect not only regular developers, but also malicious users. Being able to automate tasks or programmatically execute them unsupervised is an essential part of both regular and malicious computer usage. In this series, Trend Micro explores if a tool like Codex is reliable…

Read More
1 11 12 13 14 15 16