Hashtag
Men's Weekly

Exploring the Benefits of Cross-Platform Mobile Application Development

The digital economy of Australia is thriving, and mobile technology sits at the nucleus of this transformation. From local trade...

How to Pick the Best Hair Loss Treatment for You

Hair loss invades the lives of millions worldwide, wreaking havoc with self-esteem and self-image. With so many to choose from—w...

How React Suspense for Data Fetching Is Making Aussie Apps Lightning Fast

Image from freepik With the digital market being the overwhelming competition, the businesses in Australia are pushing the fronti...

The Boudoir Boom: Why Everyone’s Talking About These Empowering Photoshoots

Once reserved for the pages of vintage pin-up magazines or tucked-away wedding gifts, boudoir photography has undergone a cultur...

Smart Homes, Smarter Living: How Automation is Redefining the Aussie Lifestyle

From voice-controlled lighting to electric gates that open with a tap on your phone, smart home technology is no longer a glimps...

Understanding Root Canal Treatment: What You Need to Know

Image by pvproductions on Freepik When it comes to dental health, many people hear the term root canal treatment and immediately ...



To read a full copy of the report, Rethinking Tactics: 2022 Annual Cybersecurity Report, please visit: https://www.trendmicro.com/vinfo/hk/security/research-and-analysis/threat-reports/roundup/rethinking-tactics-annual-cybersecurity-roundup-2022

Jon Clay, VP of threat intelligence at Trend Micro: "The unrivaled breadth of Trend Micro threat intelligence* reveals 2022 as a year when threat actors went 'all-in' to boost profits. A surge in backdoor detections is particularly concerning in showing us their success in making landfall inside networks. To manage risk effectively across a rapidly expanding attack surface, stretched security teams need a more streamlined, platform-based approach."

The roundup report reveals several interesting trends for 2022 and beyond:

The top three MITRE ATT&CK techniques show us that threat actors are gaining initial access through remote services, then expanding their footprint within the environment through credential dumping to utilize valid accounts.

An 86% increase in backdoor malware detections reveals threat actors trying to maintain their presence inside networks for a future attack. These backdoors primarily targeted web server platform vulnerabilities.

A record number of Zero Day Initiative (ZDI) advisories (1,706) for the third year in a row is the result of a rapidly expanding corporate attack surface and researcher investment in automated analysis tools, which are finding more bugs. The number of critical vulnerabilities doubled in 2022. Two out of the top three CVEs reported in 2022 were related to Log4j.

The ZDI observed an increase in failed patches and confusing advisories, adding extra time and money to corporate remediation efforts and exposing organizations to unnecessary cyber risk.

Webshells were the top-detected malware of the year, surging 103% on 2021 figures. Emotet detections were second after undergoing something of a resurgence. LockBit and BlackCat were the top ransomware families of 2022.

Ransomware groups rebranded and diversified in a bid to address declining profits. In the future, we expect these groups to move into adjacent areas that monetize initial access, such as stock fraud, business email compromise (BEC), money laundering, and cryptocurrency theft.

Trend Micro recommends that organizations adopt a platform-based approach to managing the cyber-attack surface, mitigate security skills shortages and coverage gaps, and minimize the costs associated with point solutions. This should cover the following:

  • Asset management. Examine assets and determine their criticality, any potential vulnerabilities, the level of threat activity, and how much threat intelligence is being gathered from the asset.
  • Cloud security. Ensure that cloud infrastructure is configured with security in mind to prevent attackers from capitalizing on known gaps and vulnerabilities.
  • Proper security protocols. Prioritize updating software as soon as possible to minimize the exploitation of vulnerabilities. Options such as virtual patching can help organizations until vendors provide official security updates.
  • Attack surface visibility. Monitor disparate technologies and networks within the organization, as well as any security system that protects them. It may be difficult to correlate different data points from siloed sources.
* It covers endpoints (Android & iOS, IoT, IIoT, PCs, Macs, Linux, servers), email, web and network layers, OT networks, cloud, home networks, vulnerabilities, consumers, businesses, and governments globally.

Hashtag: #TrendMicro

The issuer is solely responsible for the content of this announcement.

About Trend Micro

Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 65 countries, Trend Micro enables organizations to simplify and secure their connected world.

IN THE NEWS

7 Tips For Choosing The Best Compensation Lawyer In Australia

Are you a victim of a motor vehicle accident? Work-related injuries? Have you suffered a psychologica.

SUNRATE signs MOU with Singapore-Thai Chamber of Commerce

Joint Effort Aims to Accelerate Growth and Expansion of Thai Companies in Singapore SINGAPORE - Media Ou.

DHL Global Forwarding announces management appointments in Asia Pacific

Effective 1 May 2024, Vincent Yong, previously President Director, DHL Global Forwarding Indonesi.

Gold, stocks, and dollar: Octa’s guide to navigating market volatility during election time

KUALA LUMPUR, MALAYSIA - Media OutReach Newswire - 2 September 2024 - The influence of presidential elec.

Appier Drives Retargeting Triumph in Hypercasual Gaming: How TapNation's Thief Puzzle Achieved KPI G…

PARIS, FRANCE - Media OutReach Newswire - 9 July 2024 - Appier, a software-as-a-service (SaaS) company .

How To Prepare For Moving Out Of A Share House

Imagine you've been living in a shared house for a few years, but now you're ready for the next step.

Health & Wellness

How to Pick the Best Hair Loss Treatment for You

Hashtag.net.au - avatar Hashtag.net.au

Hair loss invades the lives of millions worldwide, wreaking havoc with self-esteem and self-image. With so many to choose from—whether it is topical treatment and medications or newer surgical metho...

Understanding Root Canal Treatment: What You Need to Know

Hashtag.net.au - avatar Hashtag.net.au

Image by pvproductions on Freepik When it comes to dental health, many people hear the term root canal treatment and immediately feel a bit uneasy. This procedure often gets a bad reputation, but und...

Telehealth Could be the Catalyst for Better Heart Health in Australia

Hashtag.net.au - avatar Hashtag.net.au

Image by stockking on Freepik Heart disease is one of the leading causes of death in Australia despite decades of advancements in medicine and health education campaigns. More than 400 Australians ...