News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

New security solution for AI-powered data centers
New security solution for AI-powered data centers Image by evertonpestana on Pixabay

Trend Micro, a global leader in cybersecurity solutions, is introducing a new NVIDIA-powered data center security solution for business and government customers that leverages the power of AI. This is just one of several AI security solutions. Trend Vision One - Sovereign and Private Cloud (SPC) is integrated with NVIDIA NIM, a set of easy-to-use inference microservices that are part of the NVIDIA AI Enterprise Software Platform. These accelerate the deployment of generative AI in the cloud, data center, and workstations. "While many in the industry are talking about advances in AI security,...

Read more

CISOs under pressure: Should downplay cyber risks
CISOs under pressure: Should downplay cyber risks Image: MS - KI

The study results on dealing with cyber risks in companies are quite impressive. The Trend Micro study shows: Three quarters of German IT security managers (76 percent, 79 percent worldwide) feel under pressure from management to downplay cyber risks in the company. An important statement: 48 percent (41 percent worldwide) of them believe that only a serious security incident in the company would prompt management to take more decisive action against cyber risks. Why aren’t CISOs being heard? 49 percent of those surveyed in Germany (42 percent worldwide) believe that they are considered excessively negative. 32 percent (worldwide…

Read more

APT groups: Many routers as part of huge botnets 
APT groups: Many routers as part of huge botnets Image MS-KI

In a blog post, Trend Micro analyzes how Pawn Storm (also APT28 or Forest Blizzard) and other APT actors compromise routers and thus make them part of botnets. Cybercriminals and Advanced Persistent Threat (APT) actors share an interest in proxy anonymization layers and Virtual Private Network (VPN) nodes because they can hide traces of their presence and make malicious activity more difficult to detect. This interest generates malicious Internet traffic that combines financial and espionage motives. Router botnet takeover A well-known example is a cybercriminal botnet (in operation since at least 2016) that compromised…

Read more

After the LockBit blow: What about ransomware attacks?

In a current report, Trend Micro analyzes the ransomware landscape and provides an outlook on the impact the interruption of LockBit activities has on it. LockBit was not completely broken up, but its activity was severely suppressed and new malicious code developments were discovered and thus rendered unusable. In collaboration with the British National Crime Agency (NCA), Trend Micro was able to provide detailed analyzes of the ransomware group's activities and permanently disrupt the entire functionality of the malware. Since 2022, LockBit and BlackCat have consistently been among the Ransomware-as-a-Service (RaaS) providers with the most discoveries. Globally you can...

Read more

Cyber ​​threats: another record high in 2023
Cyber ​​threats: another record high in 2023

The number of cyber threats reached a record high in 2023. This is what Trend Micro’s Annual Cybersecurity Report shows. Trend Micro security systems detected and blocked malicious activity more than 161 billion times. The development of the past few years continues: since 2019, the number of threats has almost tripled to around 54 billion. The study also shows that cybercriminals are attacking more specifically, evolving their ransomware tactics and becoming more sophisticated. Companies should also urgently keep an eye on their cloud environments. Because the two most common cyber risks that Trend Micros Attack Surface Risk Management…

Read more

IT security: Basis for LockBit 4.0 defused
Trend Micro News

In collaboration with the UK's National Crime Agency (NCA), Trend Micro analyzed the in-development and unreleased version of the LockBit encryptor, rendering the entire product line unusable to cybercriminals in the future. As a criminal group, LockBit was known for innovating and trying new things. In the course of this innovative development, LockBit has released several versions of its ransomware, from version v1 (January 2020) to LockBit 2.0 (nicknamed “Red”, from June 2021) to LockBit 3.0 (“Black”, from March 2022). In October 2021, the Linux threat actor introduced…

Read more

Solar energy systems – how safe are they?
Solar energy systems - how safe are they?

A study examined the IT security of solar energy systems. Problems include a lack of encryption during data transfer, standard passwords and insecure firmware updates. Trend Micro, one of the world's leading providers of cybersecurity solutions, has released a new report examining the IT security of distributed energy systems. The researchers particularly examined the network gateways of solar energy systems - one of the most popular forms of decentralized energy generation. The increasing decentralization of the electricity supply not only represents progress in the energy transition, but also raises new security questions. Some solar energy systems pose safety risks The investigation of…

Read more

Threat from state actors
Threat from state actors

Trend Micro, one of the world's leading providers of cybersecurity solutions, announces the discovery of a security vulnerability in Microsoft Windows Defender. This is actively exploited by the cybercriminal group Water Hydra. Trend discovered this vulnerability on December 31, 2023 and has automatically protected customers from it since January 1, 2024. Organizations are advised to take immediate action to forestall continued exploitation of this vulnerability by cybercriminals. The vulnerability (CVE-2024-21412) is an active zero-day vulnerability that was reported to Microsoft by Trend Micro's Zero Day Initiative (ZDI). Trend Micro gives…

Read more

Fake Europcar hack
Fake Europcar hack

At the end of January, alleged data from around 50 million Europcar customers was offered in an underground forum. Europcar reacted quickly and denied that it was a real file. The data is neither consistent nor are the email addresses in particular known to Europcar. While Europcar suggested that this data was generated using generative AI (e.g. ChatGPT), other security researchers are of the opinion that no AI was at work here. What they all have in common, however, is the opinion that this data was generated by machines. Suspicions quickly arose in the forum too...

Read more

Cyber ​​incidents – business risk number 1
Cyber ​​incidents remain the number 1 business risk - Image by Markus Winkler on Pixabay

Cyber ​​incidents will remain the largest business risk worldwide in 2024, according to the current Allianz Risk Barometer. This includes data breaches, but especially attacks on critical infrastructure or assets as well as ransomware attacks. The Allianz Risk Barometer puts business interruptions in second place in the survey in Germany. IT now forms the basis for almost all business processes. In the event of a compromise or disruption, all or many areas of the company are directly affected and business interruptions quickly result - which explains their place on the barometer. By classifying cyber risks as the largest business risk, risk assessment gains significant...

Read more