News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Ransomware – These are the active groups 
Ransomware - These are the active groups Image: Bing - AI

The world of cybercriminals in ransomware never stands still. Constant change regularly brings new players to the forefront, who stand out due to increasingly sophisticated technologies and tactics. Here is an overview of the most active groups and their targets. The ransomware scene is particularly dynamic, with various groups competing with each other for affiliates (i.e. criminal "subcontractors" who use their extortion tools and services) and the most attractive targets. In March of this year, one of the top groups to date, ALPHV (also known as Blackcat), surprisingly disappeared from the scene after having previously outsold its accomplices by 22...

Read more

Deepfakes and AI-based cyberattacks on companies
Deepfakes and AI-based cyberattacks on companies Image: Bing - AI

More protection for all environments against the growing threat of attacks and fraud attempts using artificial intelligence (AI) and deepfakes. Trend Micro announces new features of its cybersecurity solutions for companies. Deepfakes (images, audio or video recordings that appear deceptively real and are manipulated using artificial intelligence) pose a significant risk to companies and individuals. If a fraud is successful using undetected deepfakes, this can lead to financial losses, damage to reputation, legal problems, job loss, identity theft and even damage to the mental or physical health of those affected. In a recent study conducted by Trend Micro, 36...

Read more

Rising star 2024: Ransomware group 8Base
Trend Micro News

In a new analysis, Trend Micro focuses on the ransomware group 8Base. In the first months of 2024, it took second place on the list of the "most successful" ransomware actors - just behind LockBit. With the successful operation by international law enforcement agencies against Lockbit earlier this year, 8Base is expected to further expand its importance in the ransomware landscape. The 8Base group presents itself as a penetration tester in its external presentation and claims on its leak site that it is exclusively targeting companies that "underestimate the privacy and importance of their users' data".

Read more

New security solution for AI-powered data centers
New security solution for AI-powered data centers Image by evertonpestana on Pixabay

Trend Micro, a global leader in cybersecurity solutions, is introducing a new NVIDIA-powered data center security solution for business and government customers that leverages the power of AI. This is just one of several AI security solutions. Trend Vision One - Sovereign and Private Cloud (SPC) is integrated with NVIDIA NIM, a set of easy-to-use inference microservices that are part of the NVIDIA AI Enterprise Software Platform. These accelerate the deployment of generative AI in the cloud, data center, and workstations. "While many in the industry are talking about advances in AI security,...

Read more

CISOs under pressure: Should downplay cyber risks
CISOs under pressure: Should downplay cyber risks Image: MS - KI

The study results on dealing with cyber risks in companies are quite impressive. The Trend Micro study shows: Three quarters of German IT security managers (76 percent, 79 percent worldwide) feel under pressure from management to downplay cyber risks in the company. An important statement: 48 percent (41 percent worldwide) of them believe that only a serious security incident in the company would prompt management to take more decisive action against cyber risks. Why aren’t CISOs being heard? 49 percent of those surveyed in Germany (42 percent worldwide) believe that they are considered excessively negative. 32 percent (worldwide…

Read more

APT groups: Many routers as part of huge botnets 
APT groups: Many routers as part of huge botnets Image MS-KI

In a blog post, Trend Micro analyzes how Pawn Storm (also APT28 or Forest Blizzard) and other APT actors compromise routers and thus make them part of botnets. Cybercriminals and Advanced Persistent Threat (APT) actors share an interest in proxy anonymization layers and Virtual Private Network (VPN) nodes because they can hide traces of their presence and make malicious activity more difficult to detect. This interest generates malicious Internet traffic that combines financial and espionage motives. Router botnet takeover A well-known example is a cybercriminal botnet (in operation since at least 2016) that compromised…

Read more

After the LockBit blow: What about ransomware attacks?

In a current report, Trend Micro analyzes the ransomware landscape and provides an outlook on the impact the interruption of LockBit activities has on it. LockBit was not completely broken up, but its activity was severely suppressed and new malicious code developments were discovered and thus rendered unusable. In collaboration with the British National Crime Agency (NCA), Trend Micro was able to provide detailed analyzes of the ransomware group's activities and permanently disrupt the entire functionality of the malware. Since 2022, LockBit and BlackCat have consistently been among the Ransomware-as-a-Service (RaaS) providers with the most discoveries. Globally you can...

Read more

Cyber ​​threats: another record high in 2023
Cyber ​​threats: another record high in 2023

The number of cyber threats reached a record high in 2023. This is what Trend Micro’s Annual Cybersecurity Report shows. Trend Micro security systems detected and blocked malicious activity more than 161 billion times. The development of the past few years continues: since 2019, the number of threats has almost tripled to around 54 billion. The study also shows that cybercriminals are attacking more specifically, evolving their ransomware tactics and becoming more sophisticated. Companies should also urgently keep an eye on their cloud environments. Because the two most common cyber risks that Trend Micros Attack Surface Risk Management…

Read more

IT security: Basis for LockBit 4.0 defused
Trend Micro News

In collaboration with the UK's National Crime Agency (NCA), Trend Micro analyzed the in-development and unreleased version of the LockBit encryptor, rendering the entire product line unusable to cybercriminals in the future. As a criminal group, LockBit was known for innovating and trying new things. In the course of this innovative development, LockBit has released several versions of its ransomware, from version v1 (January 2020) to LockBit 2.0 (nicknamed “Red”, from June 2021) to LockBit 3.0 (“Black”, from March 2022). In October 2021, the Linux threat actor introduced…

Read more

Solar energy systems – how safe are they?
Solar energy systems - how safe are they?

A study examined the IT security of solar energy systems. Problems include a lack of encryption during data transfer, standard passwords and insecure firmware updates. Trend Micro, one of the world's leading providers of cybersecurity solutions, has released a new report examining the IT security of distributed energy systems. The researchers particularly examined the network gateways of solar energy systems - one of the most popular forms of decentralized energy generation. The increasing decentralization of the electricity supply not only represents progress in the energy transition, but also raises new security questions. Some solar energy systems pose safety risks The investigation of…

Read more