TrendMicro

TrendMicro

Preparing for Shadow OT: A Hospital Case Study

The convergence of IT and OT is happening more rapidly than IT expects. Once upon a time, IT was so expensive that enterprises built entire departments to prioritize spending and efficiently manage those costly investments. Now, IT is so inexpensive that any individual who wants IT can buy it (or rent it). This is “Shadow…
The post Preparing for Shadow OT: A Hospital Case Study appeared first on . Read More HERE…

Read More
TrendMicro

What financial service providers should know about blockchain: Opportunities and threats

It seems that every few years, an advanced and innovative new technology emerges and becomes the next big thing for organizations across different industries. Take the cloud and big data, for example – during their buzzword stage, these concepts were being attached to just about everything in the tech space. Currently, it appears that blockchain…
The post What financial service providers should know about blockchain: Opportunities and threats appeared first on . Read More HERE…

Read More
TrendMicro

The trend toward cryptojacking: What it is and how businesses can prevent it

Digital attacks have evolved quite a bit in recent years. First, businesses and researchers observed a rash of ransomware, wherein encryption was exploited to lock users out of their data and files in an attempt to collect financial ransom. Now, the next big wave in cybercriminal strategy has come, involving increasingly popular cryptocurrencies and the…
The post The trend toward cryptojacking: What it is and how businesses can prevent it appeared first on . Read More HERE…

Read More
TrendMicro

How mobile threats impact today’s BYOD landscape

Bring-your-own-device (BYOD) has been a revolutionary concept for years now, even before it was recognized by enterprise policy. However, now that business executives and IT leaders have realized the benefits this type of strategy for their organizations, BYOD is becoming an increasingly powerful way to support efficient access and productivity. At the same time, however,…
The post How mobile threats impact today’s BYOD landscape appeared first on . Read More HERE…

Read More
TrendMicro

Zero-Day Coverage Update – Week of July 16, 2018

One night this week, I came across one of my favorite movies Willy Wonka and the Chocolate Factory. The world had gone crazy after the reclusive Willy Wonka announces that he has hidden five golden tickets in chocolate Wonka Bars that promised a factory tour and a lifetime supply of chocolate. There’s a scene at…
The post Zero-Day Coverage Update – Week of July 16, 2018 appeared first on . Read More HERE…

Read More
TrendMicro

This Week in Security News: BEC and Blackgear

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, the FBI reports a global BEC loss of over $12 billion in 2018. Also, a Blackgear cyberespionage campaign has reemerged, using social media and command-and-control (C&C) to…
The post This Week in Security News: BEC and Blackgear appeared first on . Read More HERE…

Read More
TrendMicro

Zero-Day Coverage Update – Week of July 9, 2018

Earlier this week, I wrote a blog covering a couple of the statistics from the Zero Day Initiative’s (ZDI) first half of 2018. One of the stats that I didn’t cover is the increasing focus on enterprise applications. The team is seeing consistent growth in submissions of Microsoft and Apple vulnerabilities, but now they’re also…
The post Zero-Day Coverage Update – Week of July 9, 2018 appeared first on . Read More HERE…

Read More
TrendMicro

This Week in Security News: Bloomingdale’s and Claudette

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Timehop, Macy’s, Bloomingdale’s, and Domain Factory announce a system-wide breach. Also, a new AI tool, Claudette, is holding tech companies accountable for GDPR compliance. Read on to learn…
The post This Week in Security News: Bloomingdale’s and Claudette appeared first on . Read More HERE…

Read More
TrendMicro

The Aurora Power Grid Vulnerability and the BlackEnergy Trojan

At recent Industrial IoT security briefings, the Aurora vulnerability has come up repeatedly. Attendees ask, “Is our country’s power grid safe? How can we protect the grid? What is Aurora?” This post provides a look at Aurora, and the BlackEnergy attack that can exploit Aurora. In March 2007, the US Department of Energy demonstrated the…
The post The Aurora Power Grid Vulnerability and the BlackEnergy Trojan appeared first on . Read More HERE…

Read More
TrendMicro

How the Industry 4.0 Era Will Change the Cybersecurity Landscape

Today’s highly automated and connected smart factories (Industry 4.0) were born out of yesterday’s steam engines that mechanized manufacturing (Industry 1.0); mass-production lines expanded with the advent of electricity (Industry 2.0); and then IT-enabled manufacturing plants ushered in the era of connected industrial control systems with programmable logic controllers (PLC). While enterprises struggle to enhance…
The post How the Industry 4.0 Era Will Change the Cybersecurity Landscape appeared first on . Read More HERE…

Read More