Why cybersecurity is the first step to private network deployment
Tag: Trend Micro Research : IoT
Security Vendor News
State of OT Security in 2022: Big Survey Key Insights
by Hiroyuki Ueno •
Learn about the state of OT Security in 2022 by reading the key insights found through surveying more than 900 ICS business and security leaders in the US, Germany and Japan.
Security Vendor News
Closing the Door: DeadBolt Ransomware Locks Out Vendors With Multitiered Extortion Scheme
by Trend Micro Research, News, Perspectives •
In this report, we investigate the reasons that the DeadBolt ransomware family is more problematic for its victims than other ransomware families that previously targeted NAS devices.
Security Vendor News
Celebrating 15 Years of Pwn2Own
by Trend Micro Research, News, Perspectives •
Join Erin Sindelar, Mike Gibson, Brian Gorenc, and Dustin Childs as they discuss Pwn2Own’s 15th anniversary, what we’ve learned, and how the program will continue to serve the cybersecurity community in the future.
Security Vendor News
S4x22: ICS Security Creates the Future
by Kazuhisa Tagaya •
The ICS Security Event S4 was held for the first time in two years, bringing together more than 800 business leaders and specialists from around the world to Miami Beach on 19-21 Feb 2022. The theme was CREATE THE FUTURE.
Security Vendor News
Critically Underrated: Studying the Data Distribution Service (DDS) Protocol
by Trend Micro Research, News, Perspectives •
Researchers from Trend Micro Research, TXOne, ADLINK, Alias Robotics, and ZDI looked into the Data Distribution Service (DDS) standard and its implementations from a security angle. The full findings of this research will be presented in the S4X22 Conf…
Security Vendor News
CVE-2022-22965: Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware
by Deep Patel •
We discovered active exploitation of a vulnerability in the Spring Framework designated as CVE-2022-22965 that allows malicious actors to download the Mirai botnet malware.
Security Vendor News
Cyclops Blink Sets Sights on Asus Routers
by Feike Hacquebord •
This report discusses the technical capabilities of this Cyclops Blink malware variant that targets ASUS routers and includes a list of more than 150 current and historical command-and-control (C&C) servers of the Cyclops Blink botnet.
Security Vendor News
Oil/Gas Cybersecurity: Halt Critical Operation Attacks
by Kazuhisa Tagaya •
Trend Micro has released a technical report on how the oil and gas industry can gain situational awareness across OT, IT and CT.
Security Vendor News
Utility Cybersecurity: Situational Awareness Cuts Risk
by Kazuhisa Tagaya •
Trend Micro has released a technical report on how the electric utility industry can gain situational awareness across entire network.
Security Vendor News
The Samba Vulnerability: What is CVE-2021-44142 and How to Fix It
by Trend Micro Research, News, Perspectives •
Information on the latest Samba vulnerability and how to protect systems against the threats that can exploit it.
Security Vendor News
Defending the Supply Chain: Why the DDS Protocol is Critical in Industrial and Software Systems
by Trend Micro Research, News, Perspectives •
In 2021, a team of researchers from Trend Micro Research, TXOne, ADLINK, Alias Robotics, and ZDI looked into the Data Distribution Service (DDS) standard and its implementations from a security angle. The full findings of this research will be present…
Security Vendor News
Cybersecurity for Industrial Control Systems: Part 2
by Ericka Pingol •
To cap off the series, we’ll discuss malware detection and distribution in various countries. Our team also rounds up several insights to help strengthen ICS cybersecurity and mitigate malware attacks.
Security Vendor News
Defending Users’ NAS Devices From Evolving Threats
by Stephen Hilt •
In our latest research, we analyze the threats targeting well-known brands of network-attached storage (NAS) devices.
Security Vendor News
Cybersecurity for Industrial Control Systems: Part 1
by Trend Micro Research •
In this two-part series, we look into various cybersecurity threats that affected industrial control systems endpoints. We also discuss several insights and recommendations to mitigate such threats.
Security Vendor News
The Log4j story, and how it has impacted our customers
by Trend Micro Research, News, Perspectives •
Read about the Log4j story, an analysis of the impact and what to do next.
Security Vendor News
This Week in Security News – December 17, 2021
by Jon Clay •
This week, read on Purple Fox’s infection chain observed by Trend Micro’s Managed XDR. Also, learn about the Log4j vulnerability that has the potential to cause ‘incalculable’ damage.
Security Vendor News
The Evolution of IoT Linux Malware Based on MITRE ATT&CK TTPs
by Veronica Chierzi •
In our study, we relied on the tactics, techniques, and procedures of MITRE ATT&CK to define the malware capabilities and characteristics of IoT Linux malware. We describe our findings and how IoT malware has been evolving.
Security Vendor News
Pushing Forward: Key Takeaways From Trend Micro’s Security Predictions for 2022
by Trend Micro Research, News, Perspectives •
In this entry, we discuss several of our predictions that security professionals and decision-makers should know about to help them make informed decisions on various security fronts in the coming year.
Security Vendor News
COP26 Backs Electric Vehicles to Reduce Climate Change
by Trend Micro Research, News, Perspectives •
The 26 United Nations Climate Change Conference pushes for countries of parties to adopt more widespread EV use in order to reduce the looming threats of climate change.
Security Vendor News
Private 5G Security Risks in Manufacturing Part 4
by Yohei Ishihara •
We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry.
Security Vendor News
Discovering the Exploitable Security Gaps in Remote Work Spaces
by Trend Micro Research •
Unprotected smart devices that populate home offices are seen as low-hanging fruit by cybercriminals. These machines can be compromised and used in criminal campaigns or leveraged to gain deeper access to home networks.
Security Vendor News
Discovering the Exploitable Security Gaps in Remote Work Spaces
by Trend Micro Research •
Unprotected smart devices that populate home offices are seen as low-hanging fruit by cybercriminals. These machines can be compromised and used in criminal campaigns or leveraged to gain deeper access to home networks.
Security Vendor News
This Week in Security News – November 5th, 2021
by Jon Clay •
This week, learn about what the future of cybercrime could potentially look like by the start of the next decade, according to Trend Micro’s Project 2030. Also, read on how a hacker stole $784k in crypto through SIM swaps.
Security Vendor News
Ctrl+Alt+Truth. Welcome to the future of cybercrime
by Rik Ferguson •
Welcome to 2030, to the nation of New San Joban, where a single keystroke can alter reality. Discover what a fully converged digital world means for the future of cybersecurity, and how you can stay ahead of the bad guys.
Security Vendor News
Private 5G Security Risks in Manufacturing Part 3
by Yohei Ishihara •
We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry.
Security Vendor News
Security Risks with Private 5G Networks in Manufacturing Part. 3
by Yohei Ishihara •
We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry. The option of Private 5G lets private compa…
Security Vendor News
Smart Car Makers VW & Nissan to Build Smart Factories
by Ericka Pingol •
The car-making giants have taken big leaps to ensure they address the needs and trends brought by the rapid growth of technologies in the automotive industry.
Security Vendor News
India Releases Cybersecurity Guidelines for Power Sector
by Ericka Pingol •
A first in the sector, the latest scheme aims to enhance cybersecurity readiness and the overall efficiency of the country’s distribution companies.
Security Vendor News
Forced Entry: A Security Test for Automatic Garage Doors
by Sébastien Dudek •
In this blog entry we revisit threats to automatic garage doors by using SDR to test two attack scenarios. We demonstrate a rolling code attack and one that involves a hidden remote feature.
Security Vendor News
Private 5G Security Risks in Manufacturing Part 2
by Yohei Ishihara •
We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry.
Security Vendor News
Security Risks with Private 5G in Manufacturing Companies Part. 2
by Yohei Ishihara •
We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry. The option of Private 5G lets private compa…
Security Vendor News
New Bill to Require Cyber Attack Reporting in the US
by Ericka Pingol •
The Cyber Incident Notification Act of 2021 would also require CISA to launch a program that would notify organizations of various vectors that malicious actors exploit.
Security Vendor News
Secure Manufacturing on Cloud, Edge and 5G (Download PDF)
by Kazuhisa Tagaya •
This e-book provides you with insight into system changes brought on by factory production processes and explains how the cloud and 5G have transformed smart factories. You’ll also receive a look into how we map the attack scenario so you can identify …
Security Vendor News
Honda to Start Selling Smart Car Data
by Trend Micro Research, News, Perspectives •
The auto giant is just one of many auto companies monetizing smart car data, creating a new industry set to be worth $400 billion by 2030.
Security Vendor News
Security Risks with Private 5G in Manufacturing Companies Part. 1
by Yohei Ishihara •
We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry. The option of Private 5G lets private compa…
Security Vendor News
Private 5G Security Risks in Manufacturing Part 1
by Yohei Ishihara •
We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry.
Security Vendor News
CISA, NIST Says Use Cybersecurity Control Systems
by Trend Micro Research, News, Perspectives •
The agencies conducted a crosswalk of existing cybersecurity documents and identified nine categories to be used as the foundation for preliminary control systems cybersecurity performance goals.
Security Vendor News
IoT and Zero Trust Are Incompatible? Just the Opposite
by Greg Young •
IoT is a big security headache for a lot of reasons. So how can these be part of a Zero Trust architecture?
Security Vendor News
Biden Announces Cybersecurity Initiative Partnership
by Trend Micro Research, News, Perspectives •
The announcement marks the US’s extensive collaboration with various private and education sector leaders to address the rising cyber threats in the country.