Did you know that by 2018, around 1.3 million industrial robots will be set to work in factories around the world? It’s an industry estimated to be worth $32 billion by next year, helping to power a fourth industrial revolution built on smart factories and automated processes. Yet as these robots become increasingly important in a range of industries, they’ll inevitably begin to pique the interest of cybercriminals and nation state hackers. The question is, just how exposed are they to cybersecurity threats, and what can be done about it?
That’s what Trend Micro set out to answer for the first time in a ground-breaking new report: Demonstrating Industrial Robot Attacks in Today’s Smart Factories. Its findings confirm Trend Micro as a leader in industrial IoT security, a message we’ll be taking to the Infosecurity Europe show in June. Continue reading →
Thought you’d seen the last of prolific hacking group Pawn Storm? Think again. Just-published research from Trend Micro reveals fascinating new insights into one of the world’s longest-running cyber espionage groups. As politicians in the US continue to argue over the impact of its audacious campaign against Democratic Party officials last year, Pawn Storm is at it again, attempting to influence public option ahead of major elections in France and Germany.
We’ve discovered multiple phishing domains set up by the group explicitly to target French presidential front-runner Emmanuel Macron and German political organisations allied to two main parties there.
Our report, Two Years of Pawn Storm, reveals a highly organised and sophisticated group whose tactics should make essential reading for any IT security professional looking to improve their organisation’s defences. Continue reading →
Trend Micro has been protecting organisations, governments and consumers for over two and a half decades now. Our 1,200-strong team of threat researchers work round the clock and around the globe to anticipate where the next major threats will come from, and, crucially, how to mitigate them. At this time of year we’re always asked for our predictions for the next 12 months. And while cybercriminals are unlikely to work to annual deadlines, it’s still a good time to take stock and share our insight into what our experts think 2017 holds in store.
As the bad guys get ever more determined and resourceful, it will take a solid multi-layered approach to security combined with strong people and processes to keep UK organisations safe and compliant as we head into the new year. Continue reading →
Indicators of compromise (IOCs) are an incredibly important forensic artifacts which, as the name suggests, are used in incident response and threat research to discover if a system has been compromised. They come in various forms, for example, unusual outbound network traffic, an MD5 file in a temporary directory, or even log-in irregularities. One class of IOCs so far resistant to detection by traditional methods relates to the use of external content in web-based attacks.
At Black Hat Europe earlier today, Trend Micro senior security researcher Marco Balduzzi, explained how a new machine learning approach can reap fantastic results for early detection of such threats. Continue reading →