News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Threat from state actors
Threat from state actors

Trend Micro, one of the world's leading providers of cybersecurity solutions, announces the discovery of a security vulnerability in Microsoft Windows Defender. This is actively exploited by the cybercriminal group Water Hydra. Trend discovered this vulnerability on December 31, 2023 and has automatically protected customers from it since January 1, 2024. Organizations are advised to take immediate action to forestall continued exploitation of this vulnerability by cybercriminals. The vulnerability (CVE-2024-21412) is an active zero-day vulnerability that was reported to Microsoft by Trend Micro's Zero Day Initiative (ZDI). Trend Micro gives…

Read more

Fake Europcar hack
Fake Europcar hack

At the end of January, alleged data from around 50 million Europcar customers was offered in an underground forum. Europcar reacted quickly and denied that it was a real file. The data is neither consistent nor are the email addresses in particular known to Europcar. While Europcar suggested that this data was generated using generative AI (e.g. ChatGPT), other security researchers are of the opinion that no AI was at work here. What they all have in common, however, is the opinion that this data was generated by machines. Suspicions quickly arose in the forum too...

Read more

Cyber ​​incidents – business risk number 1
Cyber ​​incidents remain the number 1 business risk - Image by Markus Winkler on Pixabay

Cyber ​​incidents will remain the largest business risk worldwide in 2024, according to the current Allianz Risk Barometer. This includes data breaches, but especially attacks on critical infrastructure or assets as well as ransomware attacks. The Allianz Risk Barometer puts business interruptions in second place in the survey in Germany. IT now forms the basis for almost all business processes. In the event of a compromise or disruption, all or many areas of the company are directly affected and business interruptions quickly result - which explains their place on the barometer. By classifying cyber risks as the largest business risk, risk assessment gains significant...

Read more

Study: Are IT security managers too confident?
Study: Are IT security managers too confident? Image by Pete Linforth on Pixabay

While traditional IT teams in companies clearly support external experts, the majority of internal IT security managers reject outside help. But can security teams afford this or are they overconfident? An enlightening study from Trend Micro. The role of cybersecurity in the business context has undergone a significant shift: once seen as a deterrent, it is increasingly recognized as a catalyst for digitalization and business development. This emerges from a study that Trend Micro carried out together with the Brandenburg Institute for Society and Security (BIGS). Although companies therefore understand the importance...

Read more

Hackers: This is the data they are looking for most
Hackers: This is the data they are looking for most

A new report on hackers shows what the thriving black market for stolen data is promoting as top offers: Cryptocurrencies are particularly popular with criminals, as well as data from web browsers such as credit card numbers and access data, which were mostly stolen via infostealers. Trend Micro researchers compared the 16 most active infostealer malware variants (malware used to steal data) on two darknet marketplaces (Russian Market and 2easy.shop) and created a risk matrix. The study shows how vulnerable data stolen by hackers is once it falls into the hands of other cybercriminals. At…

Read more

2024: The four most dangerous ransomware groups 
2024: The four most dangerous ransomware groups

Ransomware will continue to be one of the greatest threats to German companies in 2024. RaaS (Ransomware-as-a-Service) in particular is inspiring threat actors worldwide because it allows them to use state-of-the-art technology without deep technical understanding. Here are the four ransomware families that, based on current threat analyses, will pose a particular threat in 2024. The world of ransomware is constantly changing. Research by Trend Micro shows that many ransomware-as-a-service groups are no longer just targeting “big targets”. Instead, they focus on smaller companies that are less well protected. This worrying trend towards smaller and “softer” targets is…

Read more

Integrated Cloud Risk Management and XDR 
Integrated Cloud Risk Management and XDR

Trend Micro is expanding its protection by expanding its cybersecurity platform to include Cloud Risk Management and XDR. With this, companies can consolidate their cybersecurity landscape and gain a complete overview of cloud security risks in hybrid IT environments. Although resilient security requires an understanding of the risks across all systems and applications that form the attack surface, only 9 percent of organizations actively monitor them. Digital transformation and cloud migration have significantly increased the attack surface of organizations. As a result, enterprises and governments have adopted isolated security technologies for on-premises and multi-cloud environments, including AWS, Azure, GCP,…

Read more

What is the goal of ransomware attacks on cities and towns?
What is the goal of ransomware attacks on cities and towns?

There are more and more reports in the media about cyber attacks with ransomware on cities, municipalities and their administrations. However, no administration pays the ransom. So who benefits from all this? Richard Werner, business consultant at Trend Micro, gives very interesting answers to B2B CYBER SECURITY in an interview. The list of cities and communities attacked is now really long. Just recently, 12 Bavarian communities were paralyzed and blackmailed. Before that, there was a cyber attack with ransomware on the IT service provider Südwestfalen-IT by the Akira ransomware group. The provider supplies, among other things, 72 municipalities with IT services. All…

Read more

1 million euros in prize money for 58 zero-day vulnerabilities
Trend Micro's Zero Day Initiative (ZDI) is awarding prize money to ethical hackers for uncovering vulnerabilities in the Pwn2Own hacking competition. There was a reward of almost 58 million euros for finding 1 zero-day vulnerabilities.

Trend Micro's Zero Day Initiative (ZDI) is awarding prize money to ethical hackers for uncovering vulnerabilities in the Pwn2Own hacking competition. There was a reward of almost 58 million euros for finding 1 zero-day vulnerabilities. The Zero Day Initiative announces the results of the current Pwn2Own competition. At the hacking competition initiated by Trend Micro, which will take place from June 24th to 27th. The event took place in Toronto, Canada on October 58, and participants discovered a total of XNUMX previously unknown zero-day vulnerabilities. Gaps in mobile and IoT consumer products were the focus of the hacking event, Ethical hackers find zero-day vulnerabilities Several teams scored at the annual competition held in Toronto...

Read more

Analysis: This is how an attack by the Akira ransomware group works

South Westphalia's IT was attacked by the hacker group "Akira", which has meant that numerous local governments have only been able to work to a limited extent for weeks. The ransomware group encrypted server data and is now demanding a significant ransom, which is not paid. Akira, a new type of ransomware, only appeared in the spring. But who is actually behind the group? Trend Micro analyzes the background, techniques and tactics of this highly targeted successful group. “Our analysis shows that the ransomware uses similar routines to Conti, such as obfuscating strings and encrypting files. It also avoids the same file extensions as...

Read more