News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

2024: The four most dangerous ransomware groups 
2024: The four most dangerous ransomware groups

Ransomware will continue to be one of the greatest threats to German companies in 2024. RaaS (Ransomware-as-a-Service) in particular is inspiring threat actors worldwide because it allows them to use state-of-the-art technology without deep technical understanding. Here are the four ransomware families that, based on current threat analyses, will pose a particular threat in 2024. The world of ransomware is constantly changing. Research by Trend Micro shows that many ransomware-as-a-service groups are no longer just targeting “big targets”. Instead, they focus on smaller companies that are less well protected. This worrying trend towards smaller and “softer” targets is…

Read more

Integrated Cloud Risk Management and XDR 
Integrated Cloud Risk Management and XDR

Trend Micro is expanding its protection by expanding its cybersecurity platform to include Cloud Risk Management and XDR. With this, companies can consolidate their cybersecurity landscape and gain a complete overview of cloud security risks in hybrid IT environments. Although resilient security requires an understanding of the risks across all systems and applications that form the attack surface, only 9 percent of organizations actively monitor them. Digital transformation and cloud migration have significantly increased the attack surface of organizations. As a result, enterprises and governments have adopted isolated security technologies for on-premises and multi-cloud environments, including AWS, Azure, GCP,…

Read more

AI-powered cybersecurity assistants for analysts
AI-powered cybersecurity assistants for analysts - Image by DIY Team on Pixabay

Trend Micro introduces the generative AI tool Trend Companion as a new cybersecurity assistant. This helps IT security analysts optimize their workflows and improves productivity. Alerts in particular are transparent more quickly and suitable recommendations are available more quickly. Trend Companion can significantly reduce the time analysts spend on manual risk assessments and threat investigations. An easy-to-understand natural language interface explains and contextualizes alerts. reviews response measures and makes individual recommendations. deciphers and explains complex scripts and command lines. helps analysts develop and execute sophisticated threat hunting queries. helps incident responders…

Read more

What is the goal of ransomware attacks on cities and towns?
What is the goal of ransomware attacks on cities and towns?

There are more and more reports in the media about cyber attacks with ransomware on cities, municipalities and their administrations. However, no administration pays the ransom. So who benefits from all this? Richard Werner, business consultant at Trend Micro, gives very interesting answers to B2B CYBER SECURITY in an interview. The list of cities and communities attacked is now really long. Just recently, 12 Bavarian communities were paralyzed and blackmailed. Before that, there was a cyber attack with ransomware on the IT service provider Südwestfalen-IT by the Akira ransomware group. The provider supplies, among other things, 72 municipalities with IT services. All…

Read more

1 million euros in prize money for 58 zero-day vulnerabilities
Trend Micro's Zero Day Initiative (ZDI) is awarding prize money to ethical hackers for uncovering vulnerabilities in the Pwn2Own hacking competition. There was a reward of almost 58 million euros for finding 1 zero-day vulnerabilities.

Trend Micro's Zero Day Initiative (ZDI) is awarding prize money to ethical hackers for uncovering vulnerabilities in the Pwn2Own hacking competition. There was a reward of almost 58 million euros for finding 1 zero-day vulnerabilities. The Zero Day Initiative announces the results of the current Pwn2Own competition. At the hacking competition initiated by Trend Micro, which will take place from June 24th to 27th. The event took place in Toronto, Canada on October 58, and participants discovered a total of XNUMX previously unknown zero-day vulnerabilities. Gaps in mobile and IoT consumer products were the focus of the hacking event, Ethical hackers find zero-day vulnerabilities Several teams scored at the annual competition held in Toronto...

Read more

Analysis: This is how an attack by the Akira ransomware group works

South Westphalia's IT was attacked by the hacker group "Akira", which has meant that numerous local governments have only been able to work to a limited extent for weeks. The ransomware group encrypted server data and is now demanding a significant ransom, which is not paid. Akira, a new type of ransomware, only appeared in the spring. But who is actually behind the group? Trend Micro analyzes the background, techniques and tactics of this highly targeted successful group. “Our analysis shows that the ransomware uses similar routines to Conti, such as obfuscating strings and encrypting files. It also avoids the same file extensions as...

Read more

DE is most affected by ransomware compared to the EU
DE is most affected by ransomware compared to the EU

More and more small and medium-sized companies (SMEs) are increasingly the focus of cyber extortionists. The APT groups Lockbit, BlackCat and Clop (or Cl0p) are particularly active with the number of their attacks. Compared to the EU, Germany is particularly badly attacked. Trend Micro has released new analysis showing that a majority of recent ransomware attacks can be traced back to three major threat actors: Lockbit, BlackCat and Clop. The report also indicates that the number of new victims has increased by 2022 percent since the second half of 47. APT groups Lockbit, BlackCat…

Read more

Cybersecurity drives digitalization
Cybersecurity drives digitalization

A majority of German companies do not see cybersecurity as an obstacle, but rather as an enabler for digitalization and business development. Because changes help to develop new business models. Trend Micro, one of the world's leading providers of cybersecurity solutions, in collaboration with the Brandenburg Institute for Society and Security (BIGS), surveyed IT and IT security executives about their risk perception, their investment behavior and the role of IT security in their business models. Based on this data, BIGS determined connections in an empirical analysis. Cybersecurity creates the prerequisites for digital transformation Cyber ​​attacks are the biggest...

Read more

Whaling: AI-supported attacks on the big fish!
Whaling: AI-supported attacks on the big fish! - Image by istvangyal on Pixabay

The attackers try to catch the big fish in the company: In cybersecurity, this is called “whaling”. AI-powered whaling attacks threaten CEOs, lawmakers and the military. “Harpoon Whaling” is the refined method with VIP service. “Whaling” is about catching big fish. The targets of cybercriminals are executives of successful companies, high-ranking officials and military personnel. It's about stealing information or siphoning off large sums of money. The Harpoon Whaling in particular - a subspecies of Whaling - is perfidious because the attackers automatically collect extensive information about their victims and organize it using nested…

Read more

85 billion threats blocked – an increase of 30 percent
85 billion threats blocked – an increase of 30 percent - Photo by FLY:D on Unsplash

Over 85 billion threats were blocked by Trend Micro in the first half of 2023 - around a third more than in the same period last year. The new trend of cybercriminals using generative artificial intelligence (AI) and ransomware to increase their reach and efficiency is increasing. This is also shown by the Trend Micro 2023 Midyear Cybersecurity Threat Report. Trend Micro, one of the world's leading providers of cybersecurity solutions, publishes its security situation report in the middle of the year. According to this, generative artificial intelligence (AI) is becoming more and more of a threat. Not only companies, but also cyber criminals are increasingly relying on...

Read more