TrendMicro

SecurityTrendMicro

XDR Needs Network Data and Here’s Why

Credit to Author: Jon Clay (Global Threat Communications)| Date: Wed, 07 Aug 2019 15:56:40 +0000

As we’ve discussed in previous blogs, XDR is a better way to detect attacks within a network since it is able to coordinate and collaborate threat intelligence and data across multiple threat vectors, including endpoint (including mobile and IIoT), server, network, messaging, web, and cloud. In this blog I want to discuss an area of…

The post XDR Needs Network Data and Here’s Why appeared first on .

Read More
SecurityTrendMicro

Digital skimmers: What are they and how can I keep my card details safe online?

Credit to Author: Trend Micro| Date: Wed, 07 Aug 2019 14:05:18 +0000

A few weeks ago, British Airways was hit by the largest ever regulatory fine of its kind, after global customers visiting its website had their card data stolen. The $228m penalty levied by the UK’s privacy watchdog reflects the seriousness of the attack and the carrier’s failure to protect its customer’s personal and financial information….

The post Digital skimmers: What are they and how can I keep my card details safe online? appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: Ransomware Campaigns and Cryptocurrency Miners

Credit to Author: Jon Clay (Global Threat Communications)| Date: Thu, 01 Aug 2019 20:23:19 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about three different ransomware campaigns that caused havoc in different public sectors. Also, read how threat actors are infecting vulnerable Linux servers with a cryptocurrency miner….

The post This Week in Security News: Ransomware Campaigns and Cryptocurrency Miners appeared first on .

Read More
SecurityTrendMicro

Will XDR Improve Security?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Mon, 29 Jul 2019 14:06:36 +0000

Cybercriminals and malicious hackers have been shifting their tactics, techniques, and procedures (TTPs) to improve their ability to infiltrate an organization and stay under the radar of security professionals and solutions. Moving to more targeted attack methods appears to be a mainstay among threat actors, which requires organizations to improve their visibility into the entire…

The post Will XDR Improve Security? appeared first on .

Read More
SecurityTrendMicro

Windows Server 2008 End of Support: Are you Prepared?

Credit to Author: Pawan Kinger (Director, Deep Security Labs)| Date: Fri, 26 Jul 2019 13:42:36 +0000

On July 14th, 2015, Microsoft’s widely deployed Windows Server 2003 reached end of life after nearly 12 years of support. For millions of enterprise servers, this meant the end of security updates, leaving the door open to serious security risks. Now, we are fast approaching the end of life of another server operating system –…

The post Windows Server 2008 End of Support: Are you Prepared? appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: Unpatched Systems and Lateral Phishing

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 26 Jul 2019 12:57:24 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about an attack against Elasticsearch that delivers backdoors as its payload. Additionally, read how cybercriminals are turning to hijacked accounts to perform lateral phishing attacks on…

The post This Week in Security News: Unpatched Systems and Lateral Phishing appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: Spam Campaigns and Mobile Malware

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 19 Jul 2019 16:35:00 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about a mobile malware that infects Android devices by exploiting the vulnerabilities found within the operating system. Also, read about a recent spam campaign that targets…

The post This Week in Security News: Spam Campaigns and Mobile Malware appeared first on .

Read More
SecurityTrendMicro

How Will Companies Deploy Industrial IoT Security Solutions?

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Thu, 18 Jul 2019 14:05:42 +0000

Industrial IoT (IIoT) devices will comprise the majority of the billions of IoT devices deployed over the next decade. How will the information security market meet this onslaught of technology? The consumer market is not a useful guide for this analysis. Consumers buy in small quantities and choose to deploy information security tools piecemeal. Few…

The post How Will Companies Deploy Industrial IoT Security Solutions? appeared first on .

Read More