News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Welcome to the Trend Micro Partner Channel

In the partner channel you will find all articles, news and white papers published by Trend Micro sorted by date.

Trend Micro, one of the world's leading cyber security providers, is helping to create a secure world for digital data exchange. Backed by decades of security expertise, global threat research, and constant innovation, our unified cybersecurity platform protects hundreds of thousands of businesses and millions of people across clouds, networks, devices, and endpoints.

Read more

Sharp increase in malware, BEC and QR code phishing attacks
Sharp increase in malware, BEC and QR code phishing attacks Image by Elchinator on Pixabay

Trend Micro's latest email threat landscape report shows a sharp increase in malware, BEC and QR code phishing attacks on companies. Trend Micro's cloud-based email security blocked 45,2 million attacks last year. Trend Micro's latest email threat landscape report shows current changes in the cyber threat landscape. Among other things, cybercriminals are increasingly using links in email attachments and QR codes to phish login data. Email remains the main means of communication for companies and the most frequently used attack vector. This makes it all the more important to keep an eye on these developments and react if necessary. Blocked:...

Read more

Dark AI services for deepfakes or jailbreaking
Dark-AI services for deepfakes or jailbreaking Image: KI - MS

Generative AI tools have the potential to enable truly disruptive cyberattacks in the near future. But are there already new criminal LLMs or offerings of ChatGPT-like capabilities in hacking software? An analysis by Trend Micro. While AI technologies are rapidly gaining acceptance in business, there have been attempts in the cybercrime world to develop their own cybercriminal Large Language Models (LLMs) over the past year, but these have largely been abandoned. Instead, criminals have turned to "jailbreaking" existing models, i.e. using special tricks to make them ignore their built-in security measures.

Read more

Rising star 2024: Ransomware group 8Base
Trend Micro News

In a new analysis, Trend Micro focuses on the ransomware group 8Base. In the first months of 2024, it took second place on the list of the "most successful" ransomware actors - just behind LockBit. With the successful operation by international law enforcement agencies against Lockbit earlier this year, 8Base is expected to further expand its importance in the ransomware landscape. The 8Base group presents itself as a penetration tester in its external presentation and claims on its leak site that it is exclusively targeting companies that "underestimate the privacy and importance of their users' data".

Read more

New security solution for AI-powered data centers
New security solution for AI-powered data centers Image by evertonpestana on Pixabay

Trend Micro, a global leader in cybersecurity solutions, is introducing a new NVIDIA-powered data center security solution for business and government customers that leverages the power of AI. This is just one of several AI security solutions. Trend Vision One - Sovereign and Private Cloud (SPC) is integrated with NVIDIA NIM, a set of easy-to-use inference microservices that are part of the NVIDIA AI Enterprise Software Platform. These accelerate the deployment of generative AI in the cloud, data center, and workstations. "While many in the industry are talking about advances in AI security,...

Read more

APT groups: Many routers as part of huge botnets 
APT groups: Many routers as part of huge botnets Image MS-KI

In a blog post, Trend Micro analyzes how Pawn Storm (also APT28 or Forest Blizzard) and other APT actors compromise routers and thus make them part of botnets. Cybercriminals and Advanced Persistent Threat (APT) actors share an interest in proxy anonymization layers and Virtual Private Network (VPN) nodes because they can hide traces of their presence and make malicious activity more difficult to detect. This interest generates malicious Internet traffic that combines financial and espionage motives. Router botnet takeover A well-known example is a cybercriminal botnet (in operation since at least 2016) that compromised…

Read more

Phishing-as-a-Service provider LabHost smashed – perpetrators arrested

The phishing-as-a-service provider LabHost was taken offline in a joint, international operation. The PhaaS platform currently hosted 2.000 criminal users who had over 40.000 fraudulent sites online. Security specialist Trend Micro provided full support. A few days ago, international law enforcement authorities led by the British Metropolitan Police Service managed to take the infrastructure of the Phishing-as-a-Service (PhaaS) provider LabHost offline. This blow was accompanied by the arrest of several suspects. Trend Micro supported the operation as a trusted partner in the fight against cybercrime. PhaaS platform: Active since the end of 2021 At the end of 2021, LabHost, also known as…

Read more

Kapeka attack tool: The special cyber weapon 
Kapeka attack tool: The special cyber weapon MS-AI

The newly emerged IT attack tool Kapeka from Russia is currently attracting attention. Security researchers at WithSecure discovered this tool and attributed it to the Sandworm attack group, which is linked to Russian intelligence. A comment from Richard Werner, cybersecurity specialist at Trend Micro. The new IT attack tool from Russia is currently making headlines. Security researchers at WithSecure discovered the tool and attributed it to the attackers called “Sandworm.” The force, which is part of the Russian secret service, has made a name for itself since 2014 because it has targeted high-ranking targets, including in the energy sector, by using so-called zero day security gaps...

Read more

After the LockBit blow: What about ransomware attacks?

In a current report, Trend Micro analyzes the ransomware landscape and provides an outlook on the impact the interruption of LockBit activities has on it. LockBit was not completely broken up, but its activity was severely suppressed and new malicious code developments were discovered and thus rendered unusable. In collaboration with the British National Crime Agency (NCA), Trend Micro was able to provide detailed analyzes of the ransomware group's activities and permanently disrupt the entire functionality of the malware. Since 2022, LockBit and BlackCat have consistently been among the Ransomware-as-a-Service (RaaS) providers with the most discoveries. Globally you can...

Read more

Cyber ​​threats: another record high in 2023
Cyber ​​threats: another record high in 2023

The number of cyber threats reached a record high in 2023. This is what Trend Micro’s Annual Cybersecurity Report shows. Trend Micro security systems detected and blocked malicious activity more than 161 billion times. The development of the past few years continues: since 2019, the number of threats has almost tripled to around 54 billion. The study also shows that cybercriminals are attacking more specifically, evolving their ransomware tactics and becoming more sophisticated. Companies should also urgently keep an eye on their cloud environments. Because the two most common cyber risks that Trend Micros Attack Surface Risk Management…

Read more

IT security: Basis for LockBit 4.0 defused
Trend Micro News

In collaboration with the UK's National Crime Agency (NCA), Trend Micro analyzed the in-development and unreleased version of the LockBit encryptor, rendering the entire product line unusable to cybercriminals in the future. As a criminal group, LockBit was known for innovating and trying new things. In the course of this innovative development, LockBit has released several versions of its ransomware, from version v1 (January 2020) to LockBit 2.0 (nicknamed “Red”, from June 2021) to LockBit 3.0 (“Black”, from March 2022). In October 2021, the Linux threat actor introduced…

Read more