News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Security for cellular networks
Trend Micro News

Trend Micro offers new bespoke solutions and dedicated sales for telecommunications providers. This should bring comprehensive security for cellular networks and their users. Trend Micro, one of the world's leading providers of cybersecurity solutions, is increasing its activities in the telecommunications sector in Germany. The company offers telecommunications providers a comprehensive portfolio of solutions with which they can both secure their own infrastructures and offer their customers new services. Trend Micro strengthens its sales activities in the telecommunications sector in Germany. The Japanese IT security provider offers telecommunications companies a comprehensive portfolio of solutions with which they can effectively secure their networks and the underlying infrastructures - ...

Read more

Industry 4.0: critical IT interfaces
Industry 4.0 work

Trend Micro research reveals serious weaknesses in critical IT interfaces for Industry 4.0. Protocol gateways represent a security risk for intelligent industrial environments. Trend Micro today publishes research results that reveal a new type of security gap in protocol gateway devices that could expose Industrie 4.0 environments to critical attacks. These devices, also known as protocol converters, enable machines, sensors, actuators and computers within industrial environments to talk to one another and to connected IT systems. Protocol gateways can be exploited by attackers as the weakest link in the chain. “Protocol gateways rarely receive individual attention, but they are of great importance for Industry 4.0 environments. You can from ...

Read more

Software development creates weak points
Trend Micro News

Trend Micro introduces the application security risks and safeguards. Developers who work in traditional development teams tend to think about security after the fact because they focus too much on building applications and meeting deadlines. Applications play an integral role today and many businesses and users rely on a wide range of applications for work, education, entertainment, retail, and other purposes. Therefore, development teams play a key role in ensuring that applications provide users with a high level of usability, performance, and security from threat actors who ...

Read more

Target of attack: old software from industrial robots
Network industrial robots

Trend Micro provides information about dangerous design errors and weaknesses in legacy programming languages ​​for industrial robots. In collaboration with the Politecnico di Milano, Trend Micro publish basic guidelines for safe OT development. Trend Micro presents new research that indicates design weaknesses in legacy programming languages ​​used in industrial systems. The security researchers are also publishing new guidelines for secure programming, which are intended to help developers of Industry 4.0 systems to significantly reduce the surface area for software attacks. This effectively prevents business interruptions in OT (Operational Technology) environments. Vulnerable automation programs of industrial robots In cooperation with the Polytechnic University ...

Read more

Tricked: Face recognition for access controls
face recognition

The corona pandemic has asked companies around the world how they can change the way their offices work in order to ensure safe collaboration even in the age of social distancing. One guideline for this, which is implemented by many companies, is the installation of hands-free access controls at company entrances in order to reduce employee contact with potentially contaminated surfaces. Of course, managing access controls requires powerful tools to authenticate quickly and efficiently. Many companies use edge computing devices for this purpose. Edge computing is a relatively ...

Read more

Attack methods on critical Industry 4.0 environments
Trend Micro News

In collaboration with the Politecnico di Milano (Polytechnic University of Milan), Trend Micro has prepared a research report on new attack methods on critical Industry 4.0 environments. Intelligent manufacturing systems are capable of far more than just performing the tasks for which they are normally used. It is precisely this aspect that makes intelligent manufacturing systems interesting for attackers who, among other things, can try to smuggle malicious code into the system undetected. The potentially weak links in the security chain include the Manufacturing Execution System (MES), human-machine interfaces (HMIs) and individually adaptable IIoT devices. In the endangered systems ...

Read more

Quarrel in the underground
Trend Micro News

Underground forums are platforms for cybercriminals on which they offer stolen data or cybercriminal services for sale. However, there also seems to be more and more inconsistencies in the underground, which is increasingly causing trust in criminal providers to decline. Furthermore, such forums are more often broken up by police authorities, which are increasingly taking action against cybercrime. As a result, the focus of activities is increasingly directed towards e-commerce platforms and communication via Discord, which increases the anonymity of users. In addition, the prices for the illegal products and services offered are falling. Despite the…

Read more

Trend Micro: React quickly and specifically to cyber attacks
Cyber ​​attack

To be competitive today, companies need to keep pace with the latest technological trends. Without the parallel development of a security infrastructure and a clear process for responding to attacks, however, these technologies could become the fatal vector for cyber threats. In the event of a cyber attack, a strong incident response plan can get a business back up and running with minimal damage. A good playbook is of great help in setting up the incident response process. According to a study carried out by IBM and Ponemon, data theft costs the affected company an average of $ 3,92 million. These cost…

Read more

Malicious Chrome extensions lead to data theft
Trend Micro News

Google Chrome Extensions and Communigal Communication Ltd. (Galcomm) domains have been exploited in a campaign that aims to track users' activities and data. In the past three months, Awake Security had found 111 malicious or fake Chrome Extensions using Galcomm domains as Command & Control (C&C) infrastructure. There have been at least 32 million downloads of these malicious extensions. The campaign used nearly 15.160 Galcomm registered domains to host malware and browser-based monitoring tools. That is almost 60% of the domains that can be reached with this registrar. Galcomm affirms that it is not involved. The attacks successfully avoided ...

Read more