Trend Micro has been protecting organisations, governments and consumers for over two and a half decades now. Our 1,200-strong team of threat researchers work round the clock and around the globe to anticipate where the next major threats will come from, and, crucially, how to mitigate them. At this time of year we’re always asked for our predictions for the next 12 months. And while cybercriminals are unlikely to work to annual deadlines, it’s still a good time to take stock and share our insight into what our experts think 2017 holds in store.
As the bad guys get ever more determined and resourceful, it will take a solid multi-layered approach to security combined with strong people and processes to keep UK organisations safe and compliant as we head into the new year. Continue reading →
The UK’s IT decision makers have it pretty tough. On the one hand the sheer range, volume and persistence of threats today make it virtually impossible to keep digital corporate assets 100% safe. But on the other, the outrageous hyperbole spread by security vendors in what is an increasingly crowded market makes finding the right tools more challenging than it’s ever been. In these situations, the opinions of journalists, independent reviewers and customers themselves become incredibly important. Continue reading →
Indicators of compromise (IOCs) are an incredibly important forensic artifacts which, as the name suggests, are used in incident response and threat research to discover if a system has been compromised. They come in various forms, for example, unusual outbound network traffic, an MD5 file in a temporary directory, or even log-in irregularities. One class of IOCs so far resistant to detection by traditional methods relates to the use of external content in web-based attacks.
At Black Hat Europe earlier today, Trend Micro senior security researcher Marco Balduzzi, explained how a new machine learning approach can reap fantastic results for early detection of such threats. Continue reading →
Today’s IT security bosses are assailed from all sides by a huge variety of online threats. They’re designed to exploit known and unknown vulnerabilities across cloud, mobile, virtual and hybrid environments. And increasingly, they’re developed to outwit traditional signature-based tools. Yet the impact of these threats has never been greater. Data breaches and service outages can lead to heavy industry fines, damage to the brand, lost customers, remediation and clean-up costs, and even heft legal bills.
That’s why we have developed a new statistical-based approach designed to learn as it goes to detect modern unknown threats. This XGen approach was revealed at Black Hat today by senior researcher, Marco Balduzzi. Continue reading →