Trend Micro blocked an astonishing 81+ billion threats for customers in 2016, according to our newly released TrendLabs 2016 Security Roundup. If any stat speaks of the scale of the challenge facing organisations from online attackers – and the need for comprehensive multi-layered protection – it’s this one. Ransomware unsurprisingly led the way last year, with a 752% increase in new malware families discovered. But it’s Business Email Compromise (BEC) that potentially threatens to cause more problems going forward. Continue reading →
Indicators of compromise (IOCs) are an incredibly important forensic artifacts which, as the name suggests, are used in incident response and threat research to discover if a system has been compromised. They come in various forms, for example, unusual outbound network traffic, an MD5 file in a temporary directory, or even log-in irregularities. One class of IOCs so far resistant to detection by traditional methods relates to the use of external content in web-based attacks.
At Black Hat Europe earlier today, Trend Micro senior security researcher Marco Balduzzi, explained how a new machine learning approach can reap fantastic results for early detection of such threats. Continue reading →
Guest blog by Andrew Tang, Service Security Director at MTI Technology With a fantastic turnout at CLOUDSEC 2016, attendees comprised of security and IT practitioners from numerous industries. Despite these varying sectors, one thing became abundantly clear: the same issues are keeping IT security professionals awake at night – securing cloud environments, securing privileged access accounts and user education. Continue reading →
Late last week the FBI was forced to make yet another public service announcement on the growing ransomware epidemic. In it, the Bureau pleaded with businesses to report infections, so that the authorities can get a better idea of the scale of the problem they’re facing. It also warned that cybercriminals are increasingly targeting business servers in the hope of infecting more machines and extracting a greater ransom from their victims.
This tells us two things: that the authorities still haven’t got a handle on the problem facing citizens and businesses, and that organisations are failing to put in place layered security to lock down risk across multiple threat vectors. We address both in a new report out this week. Continue reading →