Hashtag
Men's Weekly


To read a full copy of the report, Rethinking Tactics: 2022 Annual Cybersecurity Report, please visit: https://www.trendmicro.com/vinfo/hk/security/research-and-analysis/threat-reports/roundup/rethinking-tactics-annual-cybersecurity-roundup-2022

Jon Clay, VP of threat intelligence at Trend Micro: "The unrivaled breadth of Trend Micro threat intelligence* reveals 2022 as a year when threat actors went 'all-in' to boost profits. A surge in backdoor detections is particularly concerning in showing us their success in making landfall inside networks. To manage risk effectively across a rapidly expanding attack surface, stretched security teams need a more streamlined, platform-based approach."

The roundup report reveals several interesting trends for 2022 and beyond:

The top three MITRE ATT&CK techniques show us that threat actors are gaining initial access through remote services, then expanding their footprint within the environment through credential dumping to utilize valid accounts.

An 86% increase in backdoor malware detections reveals threat actors trying to maintain their presence inside networks for a future attack. These backdoors primarily targeted web server platform vulnerabilities.

A record number of Zero Day Initiative (ZDI) advisories (1,706) for the third year in a row is the result of a rapidly expanding corporate attack surface and researcher investment in automated analysis tools, which are finding more bugs. The number of critical vulnerabilities doubled in 2022. Two out of the top three CVEs reported in 2022 were related to Log4j.

The ZDI observed an increase in failed patches and confusing advisories, adding extra time and money to corporate remediation efforts and exposing organizations to unnecessary cyber risk.

Webshells were the top-detected malware of the year, surging 103% on 2021 figures. Emotet detections were second after undergoing something of a resurgence. LockBit and BlackCat were the top ransomware families of 2022.

Ransomware groups rebranded and diversified in a bid to address declining profits. In the future, we expect these groups to move into adjacent areas that monetize initial access, such as stock fraud, business email compromise (BEC), money laundering, and cryptocurrency theft.

Trend Micro recommends that organizations adopt a platform-based approach to managing the cyber-attack surface, mitigate security skills shortages and coverage gaps, and minimize the costs associated with point solutions. This should cover the following:

  • Asset management. Examine assets and determine their criticality, any potential vulnerabilities, the level of threat activity, and how much threat intelligence is being gathered from the asset.
  • Cloud security. Ensure that cloud infrastructure is configured with security in mind to prevent attackers from capitalizing on known gaps and vulnerabilities.
  • Proper security protocols. Prioritize updating software as soon as possible to minimize the exploitation of vulnerabilities. Options such as virtual patching can help organizations until vendors provide official security updates.
  • Attack surface visibility. Monitor disparate technologies and networks within the organization, as well as any security system that protects them. It may be difficult to correlate different data points from siloed sources.
* It covers endpoints (Android & iOS, IoT, IIoT, PCs, Macs, Linux, servers), email, web and network layers, OT networks, cloud, home networks, vulnerabilities, consumers, businesses, and governments globally.

Hashtag: #TrendMicro

The issuer is solely responsible for the content of this announcement.

About Trend Micro

Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 65 countries, Trend Micro enables organizations to simplify and secure their connected world.

The Most Common Mistakes Sellers Make When Listing Property on the Central Coast

Selling a home is often one of the biggest financial decisions people make, and outcomes are rarely shaped by one single factor...

Experience Unmatched Durability And Beauty With Premium Hardwood Timber Batten

Imagine a space that not only looks stunning but also stands the test of time, gracefully enduring the elements and the rigours ...

Single Split System vs. Multi-Split: Which Air Conditioning Setup Is Right for Your Home?

Walls divide rooms. Air connects them. Comfort should never feel negotiated room by room. Yet many homes live with quiet trade-off...

Expert Guide: Finding the right commercial electrician for your business

When running a business, you've got enough on your plate without worrying about electrical issues. From power outages to faulty ...

Commercial Painting vs Residential Painting Services : What’s really at play here?

When people hear the word painting, they usually picture a simple home touch-up - maybe a living room spruce up or a statement w...

The Nomad’s Toolkit: How to Run an Australian Empire from a Laptop Anywhere in the World

Dreaming of working from a beachside café in Byron Bay, a winery in Margaret River or a mountain lodge in the Snowies? You are not...

IN THE NEWS

Dusit Thani Kyoto hotel receives coveted ‘Michelin Key’ from the Michelin Guide 2024

Located near Kyoto Station in the heart of Japan’s ancient former capital, Dusit’s first luxury hotel in.

Fixing and Maintaining Your Bosch Heating System in Adelaide

The weather in Adelaide is tricky and keeps on fluctuating all the time. For an optimal life and bett.

Tia Lee Graces the Cover of ELLE Malaysia: A Journey of Empowerment, Evolution, and Expression

HONG KONG SAR - Media OutReach Newswire - 3 July 2025 - Global fashion and music icon Tia Lee (Lee Yu Fe.

Perks of installing artificial turf

Believe it or not, managing the home garden is very problematic. People who have big homes with big g.

5 Reasons Why Your Business Website Needs Live Chat

Businesses thrive on communication. If a consumer cannot reach you or your team, they will quickly ge.

Things to Consider When Using Loading Platforms for Melbourne Construction Companies

You should know that Melbourne has many exceptional construction companies that anyone can rely on.

Health & Wellness

Why Choosing a GP Bundoora Is Key to Consistent and Preventive Healthcare

Hashtag.net.au - avatar Hashtag.net.au

Access to dependable primary healthcare is essential for maintaining long-term wellbeing. Choosing a trusted GP Bundoora allows individuals and families to receive ongoing medical support close to h...

What Does an NDIS Support Coordinator Actually Do?

Hashtag.net.au - avatar Hashtag.net.au

The role of a support coordinator is often mentioned in NDIS conversations, but it isn’t always clearly understood. Many participants wonder what a support coordinator actually does day to day, and ho...

Why All on 4 Dental Implants Are a Life-Changing Solution for Full-Arch Tooth Replacement

Hashtag.net.au - avatar Hashtag.net.au

Severe tooth loss can affect far more than appearance. It can impact chewing ability, speech, facial structure, and overall confidence. For individuals missing most or all of their teeth, All on 4 D...