News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Trend Micro offers a comprehensive zero trust solution

Risk information enables protection for hybrid work models even after the pandemic. Trend Micro, one of the world's leading providers of cybersecurity solutions, provides insights into the security status of identities and devices based on comprehensive risk information. For customers, this is critical to achieving true zero trust security. According to the analyst firm Forrester (1), “Zero Trust Network Access (ZTNA) is the security technology characteristic of the corona pandemic. While it (ZTNA) gently relieves users of outdated VPN technologies, it has led companies to re-use security (and networks) both now and in the future.

Read more

Ransomware targets billion-dollar companies
Ransomware targets billion-dollar companies

Nefilim ransomware specifically targets victims with over $ 1 billion in annual sales. Trend Micro study analyzes one of the most successful threat groups for modern ransomware. Trend Micro, one of the world's leading providers of cybersecurity solutions, has published a case study on the ransomware group Nefilim, which provides an in-depth look at how modern ransomware attacks work. The study provides valuable background on how ransomware groups develop, act underground and how advanced detection and response platforms contribute to their defense. Procedure of modern ransomware families The procedure of modern ransomware families makes it difficult to identify and combat cyber attacks (detection and response) for already overloaded ...

Read more

5G: Security challenge for smart factory environments
5G: Security challenge for smart factory environments

Study: 5G poses a security challenge for smart factory environments. Trend Micro Research highlights various proof-of-concept attacks on connected systems in the study “Attacks From 4G/5G Core Networks: Risks of the Industrial IoT in Compromised Campus Network ”. Trend Micro, one of the world's leading providers of cybersecurity solutions, has released a detailed study revealing emerging threats to 4G/5G campus networks. Many of these take advantage of the difficulties organizations face when patching critical OT environments. Attack scenarios on 5G networks The study describes several attack scenarios and possible protective measures. The test environment mimics the conditions of a smart factory campus network. "The…

Read more

Cloud security with MITER ATT & CK for Containers
Cloud security with MITER ATT & CK for Containers

Shaping the future of cloud security with MITER ATT & CK for Containers. Trend Micro is contributing to a new framework that helps companies build and deploy secure container environments. Trend Micro, one of the world's leading providers of cloud security, is supporting MITER with research and resources in developing a new framework for container security. Trend Micro threat intelligence was an integral part of the development of ATT & CK® for Containers. MITER benefited from the evidence-based results from several years of dedicated research with which Trend Micro supported the new framework. Evidence-based results from the research "Trend Micro ...

Read more

Endpoint security solution for industrial control systems (ICS)
Endpoint security solution for industrial control systems (ICS)

Trend Micro introduces new endpoint security solution for industrial control systems (ICS). The solution was specially developed to embed ICS environments without interruption in a comprehensive cybersecurity concept. Trend Micro, one of the world's leading providers of cybersecurity, introduces the first OT-native endpoint security solution of its kind, which is offered as part of a comprehensive security solution for smart factories. TXOne StellarProtectTM was developed by TXOne Networks to protect all OT endpoints, regardless of the respective environmental conditions, in business-critical Industrial Control System (ICS) environments. Smart factory environments offer attack surfaces The large number of ICS endpoints in smart factory environments offer numerous attack surfaces, as they are often unpatched or otherwise vulnerable.

Read more

Upcoming ransomware strategies
Upcoming ransomware strategies

Ransomware has changed over and over again over time. How much shows the Colonial Pipeline ransomware attack, which is only part of a new wave of attacks against high-ranking victims. A comment from Jon Clay, Director of Global Threat Communications, Trend Micro. After the cyber attack on one of the largest gasoline pipelines in the United States, its operation was temporarily suspended. The malicious actors aim to extort the highest possible amounts of money and therefore target organizations that are more willing to pay if they disrupt their business operations. This could already be done earlier in the case of victims from the ...

Read more

Trend Micro launches revised Phish Insight!
Trend Micro News

Trend Micro is urging companies to “Say hello to the new Phish Insight!”. With the awareness platform, employees can be tested on how they react to cyber threats with phishing. Who wouldn't want to arm their employees with the knowledge they need to protect themselves against the latest cyber threats. The new version of the awareness platform Phish Insight! is intended to quickly sensitize employees to attacks from the Internet. New functionalities of Phish Insight! Campaign Automation: Set up your campaigns to run monthly or quarterly. A selection from over 60 German simulations:…

Read more

Connected cars vulnerable to cyberattacks
Connected cars vulnerable to cyberattacks

Trend Micro publishes a new study on the safety of connected cars. This describes various cyber attacks and cyber risks that endanger the safety of the driver and others. The researchers evaluated 29 real attack scenarios using the DREAD threat model for qualitative risk analysis. These attacks can be launched remotely and / or from the victims' vehicles. The study lists the following examples: Evaluated attack scenarios DDoS attacks on Intelligent Transportation Systems (ITS) can influence the communication of the networked vehicle and represent a high risk. Exposed and vulnerable connected car systems are easy to discover, which means that ...

Read more

Dangers from social media app Clubhouse
Trend Micro News

The hype surrounding the new Clubhouse social media app continues unabated. But what about the security of the audio-only app if you use well-known people such as politicians, company bosses or employees in high positions? Comment from Udo Schneider, IoT Security Evangelist Europe at Trend Micro. Audio-based social media apps such as Clubhouse, HearMeOut or Audlist are very popular with users, but they are associated with some security risks. Cyber ​​criminals take advantage of this by targeting weak points in the system quickly and easily with mostly automated attacks. Some security risks of audio-based social media apps overlap with ...

Read more

Trend Micro expands technical team
Trend Micro News

Trend Micro continues to grow in the areas of technology and industrial security and is further expanding its technical team in Germany. As part of the strategic alignment, a dedicated sales team is also being formed for the OT and IIoT areas. Trend Micro, one of the world's leading providers of IT security, continues to expand its team for the German market despite the pandemic. The Japanese IT security provider is getting double growth in the field of technology and is also bundling its expertise in the areas of operational technology (OT) and industrial Internet of Things (IIoT). After the recently announced increase in personnel ...

Read more