Lemon Group’s Cybercriminal Businesses Built on Preinfected Devices

Credit to Author: Fyodor Yarochkin| Date: Wed, 17 May 2023 00:00:00 +0000

An overview of the Lemon Group’s use of preinfected mobile devices, and how this scheme is potentially being developed and expanded to other internet of things (IoT) devices. This research was presented in full at the Black Hat Asia 2023 Conference in Singapore in May 2023.

Read more

S4x23 Review Part 4: Cybersecurity for Industrial IoT

Credit to Author: Kazuhisa Tagaya| Date: Fri, 31 Mar 2023 00:00:00 +0000

In this fourth article, I introduce the discussion related to Industrial IoT, that is involved challenges to adopt cybersecurity strategy into modernizing environment.

Read more

S4x23 Review Part 3: Healthcare Cybersecurity Sessions

Credit to Author: Kazuhisa Tagaya| Date: Mon, 20 Mar 2023 00:00:00 +0000

This article focuses on the healthcare sector. Over the past two years, the healthcare sector has been in a constant state of emergency due to the COVID-19 pandemic, and as widely reported in the media, it has also been threatened by cyberattacks such as ransomware.

Read more

S4x23 Review Part 2: Evolving Energy Cybersecurity

Credit to Author: Kazuhisa Tagaya| Date: Mon, 13 Mar 2023 00:00:00 +0000

In this second report on S4x23 held last February, this article introduces the discussion on cyber security in the energy industry, which was one of the topics that attracted attention.

Read more

S4x23 Review Part 1: What’s New in OT Security

Credit to Author: Kazuhisa Tagaya| Date: Fri, 03 Mar 2023 00:00:00 +0000

This blog introduces discussions from S4x23, the ICS security conference in Miami over several posts. The first installment will cover two topics from the academic interviews.

Read more

CISO’s Challenges Involved with Business Leader & SOC

Credit to Author: Kazuhisa Tagaya| Date: Mon, 26 Dec 2022 00:00:00 +0000

Yohei Ishihara, IoT security evangelist at Trend Micro, discussed the challenges CISOs facing within organizations driving industrial IoT.

Read more

Ransomware Business Models: Future Pivots and Trends

Credit to Author: Feike Hacquebord| Date: Thu, 15 Dec 2022 00:00:00 +0000

Ransomware groups and their business models are expected to change from what and how we know it to date. In this blog entry, we summarize from some of our insights the triggers that spark the small changes in the short term (“evolutions”) and the bigger deviations (“revolutions”) they can redirect their criminal enterprises to in the long run.

Read more

Electricity/Energy Cybersecurity: Trends & Survey Response

Credit to Author: Mayumi Nishimura| Date: Wed, 16 Nov 2022 00:00:00 +0000

Based on our survey of over 900 ICS security leaders in the United States, Germany, and Japan, we dig deeper into each industry’s challenges and present Trend Micro’s recommendations.

Read more

Manufacturing Cybersecurity: Trends & Survey Response

Credit to Author: Mayumi Nishimura| Date: Fri, 28 Oct 2022 00:00:00 +0000

Based on our survey of over 900 ICS security leaders in the United States, Germany, and Japan, we dig deeper into each industry’s challenges and present Trend Micro’s recommendations.

Read more

Addressing Ransomware in Hospitals & Medical Devices

Credit to Author: Ericka Pingol| Date: Wed, 26 Oct 2022 00:00:00 +0000

Ransomware attacks have been on the rise in recent years, and hospitals are increasingly becoming targets. In many cases, these attacks can have devastating consequences, disrupting vital services and putting patients’ lives at risk.

Read more