Hashtag
Men's Weekly


To read a full copy of the report, Rethinking Tactics: 2022 Annual Cybersecurity Report, please visit: https://www.trendmicro.com/vinfo/hk/security/research-and-analysis/threat-reports/roundup/rethinking-tactics-annual-cybersecurity-roundup-2022

Jon Clay, VP of threat intelligence at Trend Micro: "The unrivaled breadth of Trend Micro threat intelligence* reveals 2022 as a year when threat actors went 'all-in' to boost profits. A surge in backdoor detections is particularly concerning in showing us their success in making landfall inside networks. To manage risk effectively across a rapidly expanding attack surface, stretched security teams need a more streamlined, platform-based approach."

The roundup report reveals several interesting trends for 2022 and beyond:

The top three MITRE ATT&CK techniques show us that threat actors are gaining initial access through remote services, then expanding their footprint within the environment through credential dumping to utilize valid accounts.

An 86% increase in backdoor malware detections reveals threat actors trying to maintain their presence inside networks for a future attack. These backdoors primarily targeted web server platform vulnerabilities.

A record number of Zero Day Initiative (ZDI) advisories (1,706) for the third year in a row is the result of a rapidly expanding corporate attack surface and researcher investment in automated analysis tools, which are finding more bugs. The number of critical vulnerabilities doubled in 2022. Two out of the top three CVEs reported in 2022 were related to Log4j.

The ZDI observed an increase in failed patches and confusing advisories, adding extra time and money to corporate remediation efforts and exposing organizations to unnecessary cyber risk.

Webshells were the top-detected malware of the year, surging 103% on 2021 figures. Emotet detections were second after undergoing something of a resurgence. LockBit and BlackCat were the top ransomware families of 2022.

Ransomware groups rebranded and diversified in a bid to address declining profits. In the future, we expect these groups to move into adjacent areas that monetize initial access, such as stock fraud, business email compromise (BEC), money laundering, and cryptocurrency theft.

Trend Micro recommends that organizations adopt a platform-based approach to managing the cyber-attack surface, mitigate security skills shortages and coverage gaps, and minimize the costs associated with point solutions. This should cover the following:

  • Asset management. Examine assets and determine their criticality, any potential vulnerabilities, the level of threat activity, and how much threat intelligence is being gathered from the asset.
  • Cloud security. Ensure that cloud infrastructure is configured with security in mind to prevent attackers from capitalizing on known gaps and vulnerabilities.
  • Proper security protocols. Prioritize updating software as soon as possible to minimize the exploitation of vulnerabilities. Options such as virtual patching can help organizations until vendors provide official security updates.
  • Attack surface visibility. Monitor disparate technologies and networks within the organization, as well as any security system that protects them. It may be difficult to correlate different data points from siloed sources.
* It covers endpoints (Android & iOS, IoT, IIoT, PCs, Macs, Linux, servers), email, web and network layers, OT networks, cloud, home networks, vulnerabilities, consumers, businesses, and governments globally.

Hashtag: #TrendMicro

The issuer is solely responsible for the content of this announcement.

About Trend Micro

Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 65 countries, Trend Micro enables organizations to simplify and secure their connected world.

The Role of IT Consultants in Building a Resilient, Scalable Technology Environment

Building a technology environment that can adapt to ongoing change is a priority for organisations across Australia. This articl...

The Best Solutions for Hooded Eyes: From Cosmetic to Surgical Options

Hooded eyes are a common facial feature that can influence both appearance and function. Some individuals are born with hooded e...

Why Small Caravans for Sale Are Ideal for Weekend Camping Trips

Weekend getaways are often about simplicity. A short drive, a relaxed campsite and a comfortable place to sleep can be all that ...

How Expert Guidance from a Real Estate Team Helps Buyers and Sellers

Navigating the property market can be complex, competitive and emotionally demanding. Whether purchasing your first home, upgrad...

How Grooming Improves Your Dog’s Comfort and Well-Being

Regular grooming is far more than a cosmetic routine. It plays a vital role in maintaining your dog’s comfort, health and overal...

Avoid costly downtime: Expert commercial plumbing Perth solutions

For any business operating in Perth, maintaining a smooth and efficient operation is paramount. Unexpected plumbing issues can bri...

IN THE NEWS

Henkel Vietnam supports bridge construction and educational initiatives in Soc Trang province

Building bridges and empowering communities in Vietnam HO CHI MINH CITY, VIETNAM - Media OutReach Newswi.

Workato and Tata Consultancy Services Form Strategic Alliance to Deliver Next-Gen Innovation and Hel…

The alliance will advise companies on how to streamline operational processes, accelerate digital transfo.

PTOUNX Exchange: Bridging the Cryptocurrency Economy

COLORADO, USA - Media OutReach Newswire - 21 June 2024 - PTOUNX Exchange has unveiled a series of innov.

The Importance of Pest Control for Maitland People

If you ever get the chance to visit Maitland, you should try to check out old buildings still standing .

Gold, stocks, and dollar: Octa’s guide to navigating market volatility during election time

KUALA LUMPUR, MALAYSIA - Media OutReach Newswire - 2 September 2024 - The influence of presidential elec.

Hey! Chips Launches Singapore’s First Clean-Label Fruit Bites Snack

SINGAPORE - Media OutReach Newswire - 16 April 2025 - Singapore’s leading clean snack brand, Hey! Chips.

Health & Wellness

Experience ultimate comfort: the health benefits of an adjustable bed and mattress

Hashtag.net.au - avatar Hashtag.net.au

Imagine waking up each morning feeling truly refreshed, without the usual aches and stiffness. For many, a traditional flat bed can fall short in providing the tailored support needed for optimal rest...

Why NDIS Cleaning Services Boost Health, Safety & Independence

Hashtag.net.au - avatar Hashtag.net.au

For many Australians living with a disability, maintaining a clean and safe home can be challenging. Everyday cleaning tasks-like vacuuming, mopping, sanitising kitchens, or bathrooms-may pose physica...

Why Choosing a GP Bundoora Is Key to Consistent and Preventive Healthcare

Hashtag.net.au - avatar Hashtag.net.au

Access to dependable primary healthcare is essential for maintaining long-term wellbeing. Choosing a trusted GP Bundoora allows individuals and families to receive ongoing medical support close to h...