News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

1 million euros in prize money for 58 zero-day vulnerabilities
Trend Micro's Zero Day Initiative (ZDI) is awarding prize money to ethical hackers for uncovering vulnerabilities in the Pwn2Own hacking competition. There was a reward of almost 58 million euros for finding 1 zero-day vulnerabilities.

Trend Micro's Zero Day Initiative (ZDI) is awarding prize money to ethical hackers for uncovering vulnerabilities in the Pwn2Own hacking competition. There was a reward of almost 58 million euros for finding 1 zero-day vulnerabilities. The Zero Day Initiative announces the results of the current Pwn2Own competition. At the hacking competition initiated by Trend Micro, which will take place from June 24th to 27th. The event took place in Toronto, Canada on October 58, and participants discovered a total of XNUMX previously unknown zero-day vulnerabilities. Gaps in mobile and IoT consumer products were the focus of the hacking event, Ethical hackers find zero-day vulnerabilities Several teams scored at the annual competition held in Toronto...

Read more

Analysis: This is how an attack by the Akira ransomware group works

South Westphalia's IT was attacked by the hacker group "Akira", which has meant that numerous local governments have only been able to work to a limited extent for weeks. The ransomware group encrypted server data and is now demanding a significant ransom, which is not paid. Akira, a new type of ransomware, only appeared in the spring. But who is actually behind the group? Trend Micro analyzes the background, techniques and tactics of this highly targeted successful group. “Our analysis shows that the ransomware uses similar routines to Conti, such as obfuscating strings and encrypting files. It also avoids the same file extensions as...

Read more

Proactive: Investing in IT security as a business strategy
Proactive: Investing in IT security as a business strategy

IT security is not just an investment that ensures the protection of company assets. It also creates significant added value for customers and enables new business models. This is one of the key findings of a study by Trend Micro. Trend Micro, in collaboration with the Brandenburg Institute for Society and Security (BIGS), surveyed 300 IT and IT security executives about, among other things, their investment behavior. Not just a protective shield, but also a catalyst for flourishing business models and customer satisfaction - this is a reality for those companies that are increasingly investing in IT security and proceeding strategically. They report…

Read more

Cybersecurity drives digitalization
Cybersecurity drives digitalization

A majority of German companies do not see cybersecurity as an obstacle, but rather as an enabler for digitalization and business development. Because changes help to develop new business models. Trend Micro, one of the world's leading providers of cybersecurity solutions, in collaboration with the Brandenburg Institute for Society and Security (BIGS), surveyed IT and IT security executives about their risk perception, their investment behavior and the role of IT security in their business models. Based on this data, BIGS determined connections in an empirical analysis. Cybersecurity creates the prerequisites for digital transformation Cyber ​​attacks are the biggest...

Read more

WinRAR vulnerability is already being exploited
Trend Micro News

There have been signs of a new trend in the criminal scene for some time now. The search for vulnerabilities continues. But especially in widely used non-standard software, as updating becomes more difficult. The most recent example is the compression tool WinRAR. A comment from Trend Micro. In a statement published on August 02nd, the manufacturer RARLAB described two notable vulnerabilities whose exploitation has already been proven and/or is relatively easy to exploit. The vulnerability CVE-2023-38831 describes that malware can be “smuggled” into specially prepared archives, while CVE-2023-40477 allows code to be executed on a...

Read more

Large gaps in Detection & Response in the OT area
Large gaps in Detection & Response in the OT area - image by Pete Linforth from Pixabay

A new report reveals that enterprise security operation centers (SOCs) are looking to extend detection and response into the OT space. However, a lack of employee visibility and knowledge poses significant barriers, according to a study by Trend Micro. According to the study by the Japanese cybersecurity provider, half of the companies now have an SOC that shows a certain degree of ICS/OT (Industrial Control Systems / Operational Technology) transparency. But even among the companies surveyed that have a more comprehensive SOC, only about half (53…

Read more

LinkedIn: Personal data first stolen, then sold
LinkedIn: Personal data first stolen, then sold - Image by Gerd Altmann on Pixabay

The data of a business network is also interesting for cyber gangsters: other companies are deceived with stolen contact data and profiles or the data is used for BCE mails - business email compromise. This is how users and companies can protect themselves. Almost everyone who is looking for a new job probably knows this situation: a headhunter writes to you on LinkedIn and the job offer sounds interesting. So you are quickly tempted to send your CV to the supposed headhunter without much thought. After all, speed is required when looking for a job. But beware! Japanese cybersecurity provider Trend…

Read more

Study: More effective use of data through cybersecurity
Study: More effective use of data through cybersecurity

Many decision-makers in companies do not recognize the connection between cybersecurity and effective data use - although they know that effective IT security can accelerate digitization. Trend Micro's survey of business decision-makers shows that 50 percent of respondents in Germany (61 percent globally) believe there is an urgent need to diversify their earnings in 2023; and against an uncertain macroeconomic and geopolitical backdrop. Data analytics and similar tools can increase business agility by helping companies anticipate market trends, make financial projections, and more. Another 64…

Read more

Wanted: security solutions for private 5G networks
Wanted: security solutions for private 5G networks - Image by Cliff Hang from Pixabay

Businesses are looking for security solutions that seamlessly integrate with existing 5G technologies. According to Trend Micro, the market for cybersecurity of private 5G networks will grow to $2027 billion by 12,9. Trend Micro publishes the results of its new report "Beyond Secure by Default" in cooperation with the analyst house Omdia. The study shows that the majority of companies invest 5 to 10 percent of their IT budget specifically in the security of private 5G networks, although they assume that the technology is already more secure by default than previous standards such as 3G, 4G and LTE. More safety…

Read more

Security platform with NextGen XDR and AI capabilities
Security platform with NextGen XDR and AI capabilities - image by Cliff Hang from Pixabay

The Vision One platform strengthens the cyber resilience of companies through early detection and rapid response. This is now additionally ensured by the new next-generation XDR and AI capabilities. Trend Micro thus significantly strengthens its cyber security platform. Trend Micro, one of the world's leading providers of cybersecurity solutions, introduces the new generation of its cybersecurity platform, setting a new standard for strengthening enterprise defense capabilities and threat prevention. The new Trend Vision One platform includes robust attack surface risk management, pervasive protection in hybrid environments, and next-gen XDR augmented by powerful generative AI technology….

Read more