News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

World's largest white-hacking competition in the automotive sector
World's largest white-hacking competition in the automotive sector

The world's largest white-hacking competition "Pwn22Own Automotive 24" will take place at the Tokyo Big Sight Event Center from January 2025 to 2, 2025. It is a competition for top ethical hackers and cybersecurity experts to research and resolve previously unknown cybersecurity vulnerabilities ("zero-day discovery") in the automotive sector. After the extremely successful premiere in January 2024, in which 49 previously unknown cybersecurity vulnerabilities (zero-day vulnerabilities) were discovered and reported to the respective manufacturers, the second edition of the "Pwn2Own Automotive" competition has now been announced. The event helps to lay a foundation for future cybersecurity in the automotive industry...

Read more

Attacks on the supply chain are increasing
Attacks on the supply chain are increasing

Attacks on the supply chain are particularly dangerous because they are designed to bypass security mechanisms on the part of the defenders. For example, malicious software updates are so successful because an update is usually introduced directly into the victim's data center in encrypted form. Companies often defend themselves from the outside in, with the data center itself being protected from the outside by various security layers, but often only containing minimal security precautions from the inside out. If an attack comes from within, the perpetrators can usually spread effortlessly. It hardly matters...

Read more

2023: ZDI uncovers 60 percent of software vulnerabilities
2023: ZDI uncovers 60 percent of software vulnerabilities Image: Bing - AI

According to a new Omdia report, the Trend Micro Zero Day Initiative (ZDI) uncovered 2023 percent of the software vulnerabilities examined in 60. Nine global vendors that research vulnerabilities were examined and compared. The analyst firm Omdia conducted an independent comparison of nine global vendors that research and publish vulnerabilities. In this context, 9 verified vulnerabilities published in 1.211 and assigned a CVE (Common Vulnerabilities and Exposures) number were analyzed. The analysts found that Trend published more than 2023 times as many vulnerabilities as the next smallest vendor. This makes it…

Read more

New scam Deep Fake Boss
B2B Cyber ​​Security ShortNews

Unlike classic scams such as the email-based boss scam, the Deep Fake Boss method uses high-tech manipulation to steal money. An employee, often in the finance department, appears to be personally instructed by company management to transfer money. The instructions are given convincingly in the form of a video conference in which the “boss” is supposedly present. Richard Werner, Business Consultant at Trend Micro: The “boss scam” is one of the so-called “confidence scams” ​​– i.e. fraud that has to do with the victim’s belief. The story and overall impression must be right. Already…

Read more

Pawn Storm under the microscope
Pawn Storm under the microscope

Pawn Storm (also APT28 or Forest Blizzard) is a group of APT actors characterized by persistent repetition in their tactics, techniques and procedures (TTPs). The group is known for still using its decade-old phishing email campaigns targeting high-value targets around the world. Although campaign methods and infrastructure gradually change over time, they still provide valuable information about Pawn Storm's infrastructure, including those used in more advanced campaigns. Trend Micro has the…

Read more

DE is most affected by ransomware compared to the EU
DE is most affected by ransomware compared to the EU

More and more small and medium-sized companies (SMEs) are increasingly the focus of cyber extortionists. The APT groups Lockbit, BlackCat and Clop (or Cl0p) are particularly active with the number of their attacks. Compared to the EU, Germany is particularly badly attacked. Trend Micro has released new analysis showing that a majority of recent ransomware attacks can be traced back to three major threat actors: Lockbit, BlackCat and Clop. The report also indicates that the number of new victims has increased by 2022 percent since the second half of 47. APT groups Lockbit, BlackCat…

Read more

Security 2023: Hybrid working world and connected cars in sight
Security 2023: Hybrid working world and connected cars in sight

Trend Micro publishes its cyber security predictions for 2023. In it, the company predicts an increase in cyber attacks in the areas of home office, software supply chain and cloud. And that MSPs, the hybrid working world and connected cars will increasingly be targeted by cyber attacks. According to the security researchers at Trend Micro, VPNs (Virtual Private Networks) in particular are an attractive target for cybercriminals, because the breach of a single solution can attack several corporate networks at the same time. Home devices such as routers are also targeted as easy victims of attacks, as they are often unpatched and not from…

Read more

Healthcare 2022: Almost 60 percent affected by ransomware
Healthcare 2022: Almost 60 percent affected by ransomware

As an interesting global study by Trend Micro shows, almost 60 percent of the healthcare companies surveyed were affected by ransomware in 2022. A quarter of all affected healthcare facilities have to stop operations. The supply chains were the main source of risk. According to the study by the Japanese security provider, well over half (57 percent) of the healthcare companies surveyed admitted to having been compromised by ransomware in the last three years. 25 percent of the victims also stated that their operations had come to a complete standstill. Another 60 percent experienced an impairment in their business processes. In the…

Read more

Cyber ​​risks in the software supply chain
Cyber ​​risks in the software supply chain

Log4Shell or Solarwinds are typical examples of attacks on companies through their software supply chain. It is characteristic that cybercriminals do not gain direct access to the target company, but attack via a back door. A comment from Trend Micro. If you look back at some recent attacks (esp. Solarwinds or Log4Shell), you will notice that they are playing more and more "over gangs". This means that the attackers no longer attack target companies directly, but via their (software) supply chain. Whether victims are attacked via compromised Solarwinds updates or vulnerabilities in Log4Shell - in both...

Read more

BSI: Trend Micro is a Qualified APT Response Provider
Trend Micro News

The Federal Office for Information Security (BSI) has included Trend Micro in its list of qualified APT response service providers within the meaning of Section 3 of the BSI Act. With this list, the authority supports the operators of critical infrastructures and other companies in identifying suitable partners to contain and defend against targeted cyber attacks. The prerequisite for listing is the completion of a multi-stage qualification process. Cyber ​​attacks on critical infrastructures (KRITIS) and other organizations represent a growing danger. In view of the risk, operators increasingly need support, not only in preventing but also in defending against cyber attacks. Highly targeted attacks...

Read more