News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Study: SOC employees complain about overload

Study: More than half of SOC employees complain that work has had a negative impact on their personal lives. New Trend Micro study reveals how understaffed security operations centers and alert overload can impact employee mental health. Trend Micro, one of the world's leading providers of cybersecurity solutions, publishes the results of a new study. This shows that SOC and cybersecurity teams suffer from a high level of stress beyond their day-to-day work. In particular, the overload of alerts is a major trigger for this. The report “Security Operations on the Backfoot: How poor tooling…

Read more

One TM platform very successful in ATT & CK test
OneTM platform very successful in Miter ATT & CK test

Strict tests by MITER Engenuity ATT & CK® prove exceptional protection against cyber attacks. Trend Micro's new platform for detection and response proves its advantages in sophisticated simulations. Trend Micro, one of the world's leading providers of IT security, scores extremely well in the latest ATT & CK evaluation by MITER Engenuity. The Trend Micro Vision OneTM platform quickly identified 96 percent of the attack steps in the simulation, which mimicked the behavior of two notorious advanced persistent threats (APT) groups. Realistic attacks in the MITER test In contrast to other test institutes, which test products for their ability to target various malware variants.

Read more

Cyber ​​criminals gamble with the loot
Trend Micro News

Cyber ​​criminals gamble online for profits from criminal activities such as credit card dumps and personally identifiable information (PII). Cyber ​​criminals are also feeling the effects of the COVID-19 pandemic. Not only have the nature of attacks changed, but also certain criminal activities that emerged during the restricted contact period. The focus is on supposedly mundane leisure activities such as online competitions. What distinguishes this from other online games, however, are the raffled prizes - these often come from cyber attacks. Loot as Winner Prizes Many of the prizes on offer there, which include credit card dumps and personally identifiable information (PII), ...

Read more

Cyber ​​criminals use cloud logs
Cloud security cloud logs

Cyber ​​criminals use cloud technology to accelerate attacks on businesses. Trend Micro Research finds terabytes of stolen data for sale in cloud logs. Trend Micro has identified a new breed of cybercrime. Criminals use cloud services and technologies to accelerate attacks. Companies therefore have less time to identify and react to a loss of data. Trend Micro researchers found terabytes of internal business data of companies as well as logins for popular providers such as Amazon, Google, Twitter, Facebook and PayPal, which are offered for sale on the dark web. The data is saved by accessing the cloud logs ...

Read more