A Storm’s a Coming: How businesses can defend against threat actor groups like Pawn Storm
Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Tue, 25 Apr 2017 14:00:47 +0000
Pawn Storm (aka Sednit5, Fancy Bear, APT28, Sofacy and STRONTIUM8) might sound like Instagram accounts, top-secret spy programs or recently passed legislation, but in reality they are all different names for the same successful cyber espionage group (or threat actor group). These actors often use multi-angle bombardment attacks on the same target, implementing multiple methods…
According to a recent committee hearing by the House Small Business Committee, nearly 60 percent of small companies go out of business within six months following a hack and 71 percent of all cyber assaults occur at businesses with under 100 workers. Our own data at Trend Micro indicates that small businesses are not immune…
We all know online threats are growing in volume and sophistication day by day. From ransomware designed to lock you out of your most important data, to information-stealing malware, zero-day threats and more – we all need to stay alert online. But we also need all the help afforded us by software manufacturers. That’s why…
With the growing number of threats, technologies, and responsibilities, security teams have no shortage of challenges they face daily. Now more than ever, it is important that security providers offer tools that work with these teams instead of against them; solutions that allow for opportunities in place of constraints. This is why customers were directly…
The month of March marks the one year anniversary of Trend Micro closing our acquisition of TippingPoint from Hewlett Packard Enterprise (HPE). In that past year, we made a commitment to continue to innovate the TippingPoint solution while at the same time solidly executing for our customers and seamlessly continuing business operations. I’m pleased to…
The year 2017 could be a pivotal moment for cybersecurity in Europe. And that’s thanks to two things: alleged state-sponsored interference in forthcoming national elections in the region, and looming European data protection laws. Both have escalated the issue of online threats and data security right up to board level, in Europe and the U.S….
Over the past decade, the threat landscape has evolved extensively from the beginnings of worms in 2001 to botnets and spyware in 2005. Now, targeted attacks, mobile threats and destructive crypto-ransomware are a daily reality. The damage caused by these threats has escalated, as well, to potentially crippling levels for an impacted organization. To mitigate…
At least that used to be the standard software development process. Customers were involved in feedback quite late in the development process, often after the release has been mostly formed. We recently shared how Deep Security 10 is an example of server security standing the test of time but it was also the first release…