XDR Needs Network Data and Here’s Why

Credit to Author: Jon Clay (Global Threat Communications)| Date: Wed, 07 Aug 2019 15:56:40 +0000

As we’ve discussed in previous blogs, XDR is a better way to detect attacks within a network since it is able to coordinate and collaborate threat intelligence and data across multiple threat vectors, including endpoint (including mobile and IIoT), server, network, messaging, web, and cloud. In this blog I want to discuss an area of…

The post XDR Needs Network Data and Here’s Why appeared first on .

Read more

Digital skimmers: What are they and how can I keep my card details safe online?

Credit to Author: Trend Micro| Date: Wed, 07 Aug 2019 14:05:18 +0000

A few weeks ago, British Airways was hit by the largest ever regulatory fine of its kind, after global customers visiting its website had their card data stolen. The $228m penalty levied by the UK’s privacy watchdog reflects the seriousness of the attack and the carrier’s failure to protect its customer’s personal and financial information….

The post Digital skimmers: What are they and how can I keep my card details safe online? appeared first on .

Read more

This Week in Security News: Ransomware Campaigns and Cryptocurrency Miners

Credit to Author: Jon Clay (Global Threat Communications)| Date: Thu, 01 Aug 2019 20:23:19 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about three different ransomware campaigns that caused havoc in different public sectors. Also, read how threat actors are infecting vulnerable Linux servers with a cryptocurrency miner….

The post This Week in Security News: Ransomware Campaigns and Cryptocurrency Miners appeared first on .

Read more

Will XDR Improve Security?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Mon, 29 Jul 2019 14:06:36 +0000

Cybercriminals and malicious hackers have been shifting their tactics, techniques, and procedures (TTPs) to improve their ability to infiltrate an organization and stay under the radar of security professionals and solutions. Moving to more targeted attack methods appears to be a mainstay among threat actors, which requires organizations to improve their visibility into the entire…

The post Will XDR Improve Security? appeared first on .

Read more

Windows Server 2008 End of Support: Are you Prepared?

Credit to Author: Pawan Kinger (Director, Deep Security Labs)| Date: Fri, 26 Jul 2019 13:42:36 +0000

On July 14th, 2015, Microsoft’s widely deployed Windows Server 2003 reached end of life after nearly 12 years of support. For millions of enterprise servers, this meant the end of security updates, leaving the door open to serious security risks. Now, we are fast approaching the end of life of another server operating system –…

The post Windows Server 2008 End of Support: Are you Prepared? appeared first on .

Read more

This Week in Security News: Unpatched Systems and Lateral Phishing

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 26 Jul 2019 12:57:24 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about an attack against Elasticsearch that delivers backdoors as its payload. Additionally, read how cybercriminals are turning to hijacked accounts to perform lateral phishing attacks on…

The post This Week in Security News: Unpatched Systems and Lateral Phishing appeared first on .

Read more

Where Will Ransomware Go In The Second Half Of 2019?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 09 Jul 2019 14:37:14 +0000

Ransomware has been an evolutionary malware family that continues to shift and change over the years. From the first fakeAV, to police ransomware, to the now oft-used crypto-ransomware, this threat just will not go away. Based on the latest trends, we predict this threat will grow in the second half of this year. At Trend…

The post Where Will Ransomware Go In The Second Half Of 2019? appeared first on .

Read more

Migrating Network Protection to the Cloud with Confidence

Credit to Author: Trend Micro| Date: Thu, 11 Jul 2019 12:11:50 +0000

For modern organizations, speed and agility is the key to success – built on enhanced IT efficiency and performance driven by the cloud. Anything less could see your business outpaced by the competition. As always, security must be a priority when migrating to the cloud, but network teams are being let down by existing tools….

The post Migrating Network Protection to the Cloud with Confidence appeared first on .

Read more

This Week in Security News: Banking Malware and Phishing Campaigns

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 12 Jul 2019 15:17:02 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the banking malware Anubis that has been retooled for use in fresh attack waves. Also, read about a new phishing campaign that uses OneNote audio…

The post This Week in Security News: Banking Malware and Phishing Campaigns appeared first on .

Read more

New Azure Marketplace Pay-As-You-Go Billing for Trend Micro Deep Security as a Service

Credit to Author: Trend Micro| Date: Wed, 17 Jul 2019 14:36:29 +0000

Cloud adoption continues to rise as organizations reduce their data center footprint, look to cloud native technologies to improve their application design and output, and strive to improve scalability and management of resources and systems. In a recent survey conducted by analyst firm ESG, 87% of respondents indicated that they currently run production applications and…

The post New Azure Marketplace Pay-As-You-Go Billing for Trend Micro Deep Security as a Service appeared first on .

Read more