Archive for Trend Micro

Trend Micro Announces Advanced Cloud-Native Container Security Solutions To Cloud One Platform

Posted in Commentary with tags on January 19, 2021 by itnerd

Trend Micro Incorporated today announced its advanced container security solution Cloud One – Container Security. Designed to ease the security of container builds, deployments and runtime workflows, the new service helps developers accelerate innovation and minimize application downtime across their Kubernetes environments, from a single tool.

This new service is an important addition to Trend Micro’s Cloud One services platform that was introduced last year. As IDC stated, “Trend Micro launched Cloud One, its integrated cloud security services (SaaS) platform that addresses customers’ security challenges around datacenter servers and virtual machines, IaaS workloads, containers and containers services, cloud security posture management, cloud file and object storage services, and serverless.” 

Global organizations are increasingly leveraging containers to accelerate cloud migration, rearchitect monolithic applications and build and integrate seamless cloud native applications. This can create security gaps that traditional network and endpoint tools are not capable of addressing.

Trend Micro Cloud One Container Security offers three main elements:

Container image scanning

This scans at build time for the earliest possible detection and lowest cost remediation. In addition, through partnership with Snyk there is a scan against the market leading open source vulnerability database. This provides early detection and mitigation of vulnerabilities in third-party code dependencies. Cloud One – Container Security will:

  • Look for vulnerabilities in the packages included in the container
  • Detect malware using signatures and advanced machine learning techniques
  • Find embedded secrets such as passwords, API tokens, or license keys
  • Sweep for IoCs using industry-standard Yara rules

Policy-based deployment control

Container security enables you to create policies that allow or block deployments based on set rules. Native integration with Kubernetes ensures that all deployments run in a production environment are safe.

Cloud-native runtime security

Once an image has been deemed safe and is deployed into production, Cloud One Container Security will protect the container in the runtime environment. This offers ongoing vulnerability detection for the containerized application and provides relevant feedback to security and DevOps teams in case further action is needed.

Trend Micro Partners With Simon Fraser University To Train Next Generation Of Cloud Security Professionals

Posted in Commentary with tags on January 13, 2021 by itnerd

Trend Micro and Simon Fraser University have partnered to help train future cybersecurity professionals entering the workforce at a time in which specialized skills in cloud security is needed. This new partnership is another step Trend Micro is making this year to connect Canadian students with industry insights and networking opportunities while they are still in school.

Trend Micro is already providing course lectures, lab exercises and assessments in cloud security to the first cohort of SFU’s new Professional Master’s Program in Computer Science – Cybersecurity Concentration, which launched in September 2020. In the span of 16 to 20 months, the program educates students in a broad range of cybersecurity topics. Almost half of the curriculum consists of lab work providing students with hands-on experience necessary for a successful career path in the cybersecurity field. 

Students have the opportunity to explore cyber risks related to cloud infrastructure and cloud native applications. In addition, they are learning the necessary skills needed to secure these environments in an AWS lab environment using some of Trend Micro’s CloudOne solutions pertaining to cloud security posture management and runtime application self protection.

Trend Micro’s 2021 Predictions Report echoes this need for upskilling students and the current workforce. It also stresses the need for fostering user education and training while many employees continue to work from home and mix personal and professional information online.

Healthcare, Research & E-commerce To Face Heightened Security Risk In 2021: Trend Micro

Posted in Commentary with tags on December 8, 2020 by itnerd

The latest 2021 predictions report from Trend Micro found, a new wave of threats will emerge, and organizations will face new challenges brought on by shifts to both remote work and priorities of organizations and governments. The widespread reliance on the cloud to conduct business will also create new vectors for breaches and attacks by criminals, leaving security teams scrambling with decreased economic resources.

Some of the other predictions from Trend Micro include:

  1. Threat actors will turn home offices into their new criminal hubs
  2. The Covid-19 pandemic will upend cybersecurity priorities as it proves to be fertile ground for malicious campaigns
  3. Teleworking setups will force organizations to confront hybrid environments and unsustainable security architectures
  4. Governments will face a tug-of-war between upholding data privacy and ensuring public health
  5. Attackers will quickly weaponize newly disclosed vulnerabilities, leaving users with a narrow window for patching
  6. Exposed APIs will be the next favoured attack vector for enterprise breaches
  7. Enterprise software and cloud applications used for remote work will be hounded with critical class bugs

All of that is going make 2021 a very “interesting” year for those in charge of defending companies against these sorts of things.

Trend Micro Blocked 8.8 Million COVID-19 Threats in the First Half of 2020

Posted in Commentary with tags on August 26, 2020 by itnerd

Trend Micro Incorporated (TYO: 4704; TSE: 4704), the leader in cloud security, today released its annual mid-year roundup report, which reveals COVID-19 related threats as the single largest type of threat in the first half of the year. In just six months, Trend Micro blocked 8.8 million COVID-19 related threats, nearly 92% of which were email-based.

Cybercriminals shifted their focus from January through June to take advantage of global interest in the pandemic. The risk to businesses was compounded by security gaps created by a completely remote workforce.

In total, Trend Micro blocked 27.8 billion cyber threats in the first half of 2020, 93% of which were email-borne.

Business Email Compromise (BEC) detections increased by 19% from the second half of 2019, in part due to scammers trying to capitalize on home workers being more exposed to social engineering.

Among all the threats in the first half of the year, ransomware was a constant factor. Although the number of detected ransomware threats decreased, Trend Micro saw a 45% increase in new ransomware families compared to the same time last year. 

Global organizations have also been burdened by a significant spike in newly disclosed vulnerabilities. Trend Micro’s Zero Day Initiative (ZDI) published a total of 786 advisories, representing a 74% increase from the second half of 2019. Some of these came as part of Microsoft Patch Tuesday updates, which have fixed an average of 103 CVEs per month so far in 2020 — including the largest number of patches ever issued in a single month (129) in June.

Trend Micro also observed a 16% increase in vulnerabilities disclosed in industrial control systems (ICS), compared to the first half of 2019, which could create major challenges for smart factory owners and other organizations running IIoT environments.

To effectively protect dispersed corporate networks, Gartner recommends businesses “refine security monitoring capabilities to reflect an operating environment where network traffic patterns, data and system access vectors have changed due to increased remote and mobile operations.[1]” Trend Micro XDR helps customers do exactly that by correlating security events across the entire IT environment, which is critical for holistic protection in the second half of 2020.

To learn more about the threat landscape in the first half of 2020 and how businesses can stay secure moving forward, read the full report here: https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/securing-the-pandemic-disrupted-workplace-trend-micro-2020-midyear-cybersecurity-report.

Trend Micro & Snyk Expand Partnership With Technology Collaboration To Solve Open Source Development Risks

Posted in Commentary with tags on August 25, 2020 by itnerd

Trend Micro today announced plans for a new, co-developed solution with Snyk, the leader in developer-first open source security. The joint solution will help security teams manage the risk of open source vulnerabilities from the moment open source code is introduced without interrupting the software delivery process. This marks the expansion of a strategic partnership that has already helped countless organizations enhance DevOps security without impacting product roadmaps.

The latest capabilities, delivered by combining the strengths of both companies, enables teams to find vulnerabilities in open source code automatically and immediately. It offers significant benefits for security and development teams, including helping to support compliance with ISO 27001, SOC 2 and other key frameworks and standards.

The joint solution will help create fundamental mind shifts in collaboration, driving closer alignment between security and developer teams. It will be available as part of the Trend Micro Cloud One platform, for additional details visit: www.trendmicro.com/cloudonehave. For an overview of the partnership visit: www.trendmicro.com/snyk.

Trend Micro Research Reveals Dangerous Design Flaws and Vulnerabilities In Legacy Programming Languages

Posted in Commentary with tags on August 6, 2020 by itnerd

Trend Micro Incorporated today announced new research highlighting design flaws in legacy languages and released new secure coding guidelines to help Industry 4.0 developers greatly reduce the software attack surface. And with this decrease business disruption in operational technology (OT) environments.

Conducted jointly with Politecnico di Milano, the research details how design flaws in legacy programming languages could lead to vulnerable automation programs. These insecurities could enable attackers to hijack industrial robots and automation machines to disrupt production lines or steal intellectual property. According to the research, the industrial automation world may be unprepared to detect and prevent the exploitation of the issues found. Therefore, it is imperative that the industry start embracing and establishing network-security best practices and secure-coding practices, which have been updated with industry leaders as a result of this research.

Legacy proprietary programming languages such as RAPID, KRL, AS, PDL2, and PacScript were designed without an active attacker model in mind. Developed decades ago, they are now essential to critical automation tasks on the factory floor, but can’t themselves be fixed easily.

Not only are vulnerabilities a concern in the automation programs written using these proprietary languages, but researchers demonstrate how a new kind of self-propagating malware could be created using one of the legacy programming languages as an example. 

Trend Micro Research has worked closely with The Robotic Operating System Industrial Consortium to establish recommendations to reduce the exploitability of the identified issues[1].

As these new guidelines demonstrate, the task programs that rely on these languages and govern the automatic movements of industrial robots can be written in a more secure manner to mitigate Industry 4.0 risk. The essential checklist for writing secure task programs includes the following:

  • Treat industrial machines as computers and task programs as powerful code
  • Authenticate every communication
  • Implement access control policies
  • Always perform input validation
  • Always perform output sanitization
  • Implement proper error handling without exposing details
  • Put proper configuration and deployment procedures in places

In addition, Trend Micro Research and Politecnico di Milano have also developed a patent-pending tool to detect vulnerable or malicious code in task programs, thus preventing damage at runtime.

As a result of this research, security-sensitive features were identified in the eight most popular industrial robotic programming platforms, and a total of 40 instances of vulnerable open source code have been found. One vendor has removed the automation program affected by a vulnerability from its application store for industrial software, and two more have been acknowledged by the maintainer, leading to fruitful discussion. Details of the vulnerability disclosures have also been shared by ICS-CERT in an alert to their community.

The results of this research will be presented at Black Hat USA on August 5, and at the ACM AsiaCCS conference in October in Taipei. 

To find out more, please find the complete research report here: https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/unveiling-the-hidden-risks-of-industrial-automation-programming.

2/3 of Canadians More Aware Of Cybersecurity Policies Since Lockdown: Trend Micro

Posted in Commentary with tags on July 3, 2020 by itnerd

Trend Micro Incorporated today released survey results that show how remote workers address cybersecurity. Nearly three quarters (72%) of remote workers say they are more conscious of their organisation’s cybersecurity policies since lockdown began, but many are breaking the rules anyway due to limited understanding or resource constraints.

Trend Micro’s Head in the Clouds study is distilled from interviews with 13,200 remote workers across 27 countries on their attitudes towards corporate cybersecurity and IT policies. It reveals that there has never been a better time for companies to take advantage of heightened employee cybersecurity awareness. The survey reveals that the approach businesses take to training is critical to ensure secure practices are being followed.

The results indicate a high level of security awareness, with 85% of respondents claiming they take instructions from their IT team seriously, and 81% agree that cybersecurity within their organisation is partly their responsibility. Additionally, 64% acknowledge that using non-work applications on a corporate device is a security risk.

However, just because most people understand the risks does not mean they stick to the rules.

For example:

  • 56% of employees admit to using a non-work application on a corporate device, and 66% of them have actually uploaded corporate data to that application.
  • 80% of respondents confess to using their work laptop for personal browsing, and only 36% of them fully restrict the sites they visit.
  • 39% of respondents say they often or always access corporate data from a personal device – almost certainly breaking corporate security policy.
  • 8% of respondents admit to watching / accessing porn on their work laptop, and 7% access the dark web.

Productivity still wins out over protection for many users. A third of respondents (34%) agree that they do not give much thought to whether the apps they use are sanctioned by IT or not, as they just want the job done. Additionally, 29% think they can get away with using a non-work application, as the solutions provided by their company are ‘nonsense.’

The Head in the Clouds study looks into the psychology of people’s behaviour in terms of cybersecurity, including their attitudes towards risk. It presents several common information security “personas” with the aim of helping organizations tailor their cybersecurity strategy in the right way for the right employee.

Trend Micro Research Identifies Critical Industry 4.0 Attack Methods

Posted in Commentary with tags on May 11, 2020 by itnerd

Trend Micro today released research describing how advanced hackers could leverage unconventional, new attack vectors to sabotage smart manufacturing environments. 

For this report, Trend Micro Research worked with Politecnico di Milano in its Industry 4.0 lab, which houses real manufacturing equipment from industry leaders, to demonstrate how malicious threat actors can exploit existing features and security flaws in Industrial IoT (IIoT) environments for espionage of financial gain.

Critical smart manufacturing equipment relies primarily on proprietary systems, however these machines have the computing power of traditional IT systems. They are capable of much more than the purpose for which they are deployed, and attackers are able to exploit this power. The computers primarily use proprietary languages to communicate, but just like with IT threats, the languages can be used to input malicious code, traverse through the network, or steal confidential information without being detected.

Though smart manufacturing systems are designed and deployed to be isolated, this seclusion is eroding as IT and OT converge. Due to the intended separation, there is a significant amount of trust built into the systems and therefore very few integrity checks to keep malicious activity out.

The systems and machines that could be taken advantage of include the manufacturing execution system (MES), human machine interfaces (HMIs), and customizable IIoT devices. These are potential weak links in the security chain and could be exploited in such a way to damage produced goods, cause malfunctions, or alter workflows to manufacture defective products.

The report offers a detailed set of defense and mitigation measures, including:

  • Deep packet inspection that supports OT protocols to identify anomalous payloads at the network level
  • Integrity checks run regularly on endpoints to identify any altered software components
  • Code-signing on IIoT devices to include dependencies such as third-party libraries
  • Risk analysis to extend beyond physical safety to automation software
  • Full chain of trust for data and software in smart manufacturing environments
  • Detection tools to recognize vulnerable/malicious logic for complex manufacturing machines
  • Sandboxing and privilege separation for software on industrial machines

To find out more and read the full report, please visit: https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/threats-and-consequences-a-security-analysis-of-smart-manufacturing-systems

Trend Micro Offers Tips To Secure Devices While You Work From Home

Posted in Commentary with tags on March 18, 2020 by itnerd

Across industries and geographies, companies are implementing work from home policies to prevent the spread of COVID-19, resulting in a spike in the number of teleworkers. At such times, it’s imperative for devices to be secure.

Below are best practices from Trend Micro that organizations can undertake, in order to mitigate potential risks of a cyberbreach:

  • Enable the firewall for added security in devices, or use a virtual network especially when remotely accessing assets.
  • Update the firmware of wi-fi enabled devices, routers, and other hardware as soon as updates are available.
  • Change default wi-fi network names and passwords to complex credentials to deter unauthorized access.

Also, in an effort to help reduce the security risks of computers connecting to corporate networks, Trend Micro is also offering businesses a 6-month free trial of their Maximum Security product to be installed on home computers so employees can work securely during this unfortunate crisis.

Trend Micro Blocked 13 Million High-Risk Email Threats in 2019

Posted in Commentary with tags on March 12, 2020 by itnerd

Trend Micro Incorporated has released its 2019 Cloud App Security Roundup report. The report highlights changes in messaging-specific threats detected last year, the use of more sophisticated malware, and the potential abuse of emerging technologies in artificial intelligence to inform future business protection strategies.

In 2019, Trend Micro blocked 12.7 million high-risk email threats for customers leveraging cloud-based email services from Microsoft and Google. This second layer of defense caught threats beyond those detected by the cloud email services’ built-in security.

More than 11 million of the high-risk emails blocked in 2019 were phishing related, making up 89% of all blocked emails. Of these, Trend Micro detected 35% more credential phishing attempts than in 2018. Additionally, the number of unknown phishing links in such attacks jumped from just 9% of the total to more than 44% in 2019. This may demonstrate that scammers are registering new sites to avoid detection.

The report also shows that criminals are getting better at tricking the first layer of defense against Business Email Compromise (BEC) attacks, which typically look at attacker behaviors and intention analysis of the email content. The percentage of BEC attacks caught by AI-powered authorship analysis increased from 7% in 2018 to 21% in 2019.

Emerging phishing techniques outlined in the report include the increasing use of HTTPS and targeting Office 365 administrator accounts. This enables malicious hackers to hijack all connected accounts on the targeted domain and use them to send malware, launch convincing BEC attacks and more. To this end, Trend Micro blocked nearly 400,000 attempted BEC attacks, which is 271% more than in 2018.

In the face of such threats, Trend Micro recommends the organizations take the following mitigation steps:

  • Move away from a single gateway to a multi-layered cloud app security solution
  • Consider sandbox malware analysis, document exploit detection, and file, email, and web reputation technologies to detect malware hidden in Office 365 and PDF documents
  • Enforce consistent data loss prevention (DLP) policies across cloud email and collaboration apps
  • Choose a security partner that can offer seamless integration into their cloud platforms, preserving user and admin functions
  • Develop comprehensive end user awareness and training programs

The report’s findings were based on data generated by Trend Micro Cloud App Security™, an API-based solution that protects a range of cloud-based applications and services, including Microsoft® Office 365™ Exchange™ Online, OneDrive® for Business, SharePoint® Online, Gmail, and Google Drive.

To find out more, please read the complete report here:https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/trend-micro-cloud-app-security-report-2019