News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Welcome to the Trend Micro Partner Channel

In the partner channel you will find all articles, news and white papers published by Trend Micro sorted by date.

Trend Micro, one of the world's leading cyber security providers, is helping to create a secure world for digital data exchange. Backed by decades of security expertise, global threat research, and constant innovation, our unified cybersecurity platform protects hundreds of thousands of businesses and millions of people across clouds, networks, devices, and endpoints.

Read more

New scam Deep Fake Boss
B2B Cyber ​​Security ShortNews

Unlike classic scams such as the email-based boss scam, the Deep Fake Boss method uses high-tech manipulation to steal money. An employee, often in the finance department, appears to be personally instructed by company management to transfer money. The instructions are given convincingly in the form of a video conference in which the “boss” is supposedly present. Richard Werner, Business Consultant at Trend Micro: The “boss scam” is one of the so-called “confidence scams” ​​– i.e. fraud that has to do with the victim’s belief. The story and overall impression must be right. Already…

Read more

Threat from state actors
Threat from state actors

Trend Micro, one of the world's leading providers of cybersecurity solutions, announces the discovery of a security vulnerability in Microsoft Windows Defender. This is actively exploited by the cybercriminal group Water Hydra. Trend discovered this vulnerability on December 31, 2023 and has automatically protected customers from it since January 1, 2024. Organizations are advised to take immediate action to forestall continued exploitation of this vulnerability by cybercriminals. The vulnerability (CVE-2024-21412) is an active zero-day vulnerability that was reported to Microsoft by Trend Micro's Zero Day Initiative (ZDI). Trend Micro gives…

Read more

Pawn Storm under the microscope
Pawn Storm under the microscope

Pawn Storm (also APT28 or Forest Blizzard) is a group of APT actors characterized by persistent repetition in their tactics, techniques and procedures (TTPs). The group is known for still using its decade-old phishing email campaigns targeting high-value targets around the world. Although campaign methods and infrastructure gradually change over time, they still provide valuable information about Pawn Storm's infrastructure, including those used in more advanced campaigns. Trend Micro has the…

Read more

Fake Europcar hack
Fake Europcar hack

At the end of January, alleged data from around 50 million Europcar customers was offered in an underground forum. Europcar reacted quickly and denied that it was a real file. The data is neither consistent nor are the email addresses in particular known to Europcar. While Europcar suggested that this data was generated using generative AI (e.g. ChatGPT), other security researchers are of the opinion that no AI was at work here. What they all have in common, however, is the opinion that this data was generated by machines. Suspicions quickly arose in the forum too...

Read more

Cyber ​​incidents – business risk number 1
Cyber ​​incidents remain the number 1 business risk - Image by Markus Winkler on Pixabay

Cyber ​​incidents will remain the largest business risk worldwide in 2024, according to the current Allianz Risk Barometer. This includes data breaches, but especially attacks on critical infrastructure or assets as well as ransomware attacks. The Allianz Risk Barometer puts business interruptions in second place in the survey in Germany. IT now forms the basis for almost all business processes. In the event of a compromise or disruption, all or many areas of the company are directly affected and business interruptions quickly result - which explains their place on the barometer. By classifying cyber risks as the largest business risk, risk assessment gains significant...

Read more

Study: Are IT security managers too confident?
Study: Are IT security managers too confident? Image by Pete Linforth on Pixabay

While traditional IT teams in companies clearly support external experts, the majority of internal IT security managers reject outside help. But can security teams afford this or are they overconfident? An enlightening study from Trend Micro. The role of cybersecurity in the business context has undergone a significant shift: once seen as a deterrent, it is increasingly recognized as a catalyst for digitalization and business development. This emerges from a study that Trend Micro carried out together with the Brandenburg Institute for Society and Security (BIGS). Although companies therefore understand the importance...

Read more

2024: AI-assisted cyberattacks on the rise
2024: AI-assisted cyberattacks on the rise

Trend Micro's 2024 cybersecurity predictions warn of the transformative role of generative artificial intelligence (AI) in the cyber threat landscape, as well as a new wave of sophisticated social engineering tactics and identity theft using AI-powered tools . The widespread availability and improved quality of generative AI combined with Generative Adversarial Networks (GANs) to generate realistic photo, audio and video content will have a lasting impact on the phishing landscape in 2024. Trend Micro predicts a new wave of Business Email Compromise (BEC ), virtual kidnapping and other scams – triggered by the cost-effective…

Read more

Hackers: This is the data they are looking for most
Hackers: This is the data they are looking for most

A new report on hackers shows what the thriving black market for stolen data is promoting as top offers: Cryptocurrencies are particularly popular with criminals, as well as data from web browsers such as credit card numbers and access data, which were mostly stolen via infostealers. Trend Micro researchers compared the 16 most active infostealer malware variants (malware used to steal data) on two darknet marketplaces (Russian Market and 2easy.shop) and created a risk matrix. The study shows how vulnerable data stolen by hackers is once it falls into the hands of other cybercriminals. At…

Read more

2024: The four most dangerous ransomware groups 
2024: The four most dangerous ransomware groups

Ransomware will continue to be one of the greatest threats to German companies in 2024. RaaS (Ransomware-as-a-Service) in particular is inspiring threat actors worldwide because it allows them to use state-of-the-art technology without deep technical understanding. Here are the four ransomware families that, based on current threat analyses, will pose a particular threat in 2024. The world of ransomware is constantly changing. Research by Trend Micro shows that many ransomware-as-a-service groups are no longer just targeting “big targets”. Instead, they focus on smaller companies that are less well protected. This worrying trend towards smaller and “softer” targets is…

Read more

Integrated Cloud Risk Management and XDR 
Integrated Cloud Risk Management and XDR

Trend Micro is expanding its protection by expanding its cybersecurity platform to include Cloud Risk Management and XDR. With this, companies can consolidate their cybersecurity landscape and gain a complete overview of cloud security risks in hybrid IT environments. Although resilient security requires an understanding of the risks across all systems and applications that form the attack surface, only 9 percent of organizations actively monitor them. Digital transformation and cloud migration have significantly increased the attack surface of organizations. As a result, enterprises and governments have adopted isolated security technologies for on-premises and multi-cloud environments, including AWS, Azure, GCP,…

Read more