Top 3 Non-Technical Cybersecurity Trends for 2023

Credit to Author: Greg Young| Date: Thu, 01 Dec 2022 00:00:00 +0000

A strong cybersecurity strategy isn’t just about choosing the right tools. Cybersecurity experts Greg Young and William Malik discuss three non-technical cybersecurity trends for 2023 to help security leaders reduce cyber risk across the enterprise attack surface.

Read more

Cyber Crime: INTERPOL Uses Trend Threat Intelligence

Credit to Author: Jon Clay| Date: Fri, 25 Nov 2022 00:00:00 +0000

INTERPOL recently conducted operation African Surge to take down malicious infrastructure across the African continent and requested the help of private enterprises. Trend Micro is proud to have been asked to participate, and provided global threat intelligence that was utilized in this operation.

Read more

How a Unified Security Platform Protects the Cloud

Credit to Author: Mike Milner| Date: Thu, 24 Nov 2022 00:00:00 +0000

Massive growth in cloud use has increased the enterprise attack surface. Addressing the risks with specialized point solutions is unwieldy, complex and can leave vulnerability gaps—driving many companies to seek a unified cyber security platform.

Read more

Earth Preta Spear-Phishing Governments Worldwide

Credit to Author: Nick Dai| Date: Fri, 18 Nov 2022 00:00:00 +0000

We break down the cyberespionage activities of advanced persistent threat (APT) group Earth Preta, observed in large-scale attack deployments that began in March. We also show the infection routines of the malware families they use to infect multiple sectors worldwide: TONEINS, TONESHELL, and PUBLOAD.

Read more

Email Security Best Practices for Phishing Prevention

Credit to Author: Jon Clay| Date: Thu, 17 Nov 2022 00:00:00 +0000

Trend Micro Research reported a 137.6% growth in phishing attacks blocked and detected in 2021. Explore the latest phishing trends and email security best practices to enhance your email security and reduce cyber risk.

Read more

Complete Guide to Protecting 7 Attack Vectors

Credit to Author: Jon Clay| Date: Tue, 15 Nov 2022 00:00:00 +0000

The quicker a cyberattack is identified, the less it costs. Jon Clay, VP of Threat Intelligence, reviews 7 key initial attack vendors and provides proactive security tips to help you reduce cyber risk across the attack surface.

Read more

Will Cloud-Native Network Security Oust Firewalls?

Credit to Author: Duane Seon| Date: Wed, 16 Nov 2022 00:00:00 +0000

Security threats have already begun to outpace cloud firewalls. It’s a fact. But organizations exploring new cloud-native solution find themselves more prepared to stay resilient. Find out how cloud-native network security’s features and benefits are making this possible.

Read more