Hashtag
Men's Weekly

Choosing the Right Fixtures at Trusted Lighting Stores Perth

Lighting is one of the most impactful aspects of interior and exterior design. It sets the tone, enhances functionality, and add...

Sleep Dentistry for Anxiety: How Modern Treatment Helps Patients Relax

For many people, dental anxiety isn’t just a minor worry — it’s a barrier that keeps them from getting the care they need. The sou...

Common Door Hardware Problems and How to Fix Them

Door hardware plays a bigger role in our daily lives than most people realise. From the humble handle to the complex locking mec...

From Unwell to Addicted – Preventing the Slippery Slope

Substance abuse and mental illness are heavily intertwined. Addiction can increase the risk of developing another mental illness...

From Unwell to Addicted – Preventing the Slippery Slope

Substance abuse and mental illness are heavily intertwined. Addiction can increase the risk of developing another mental illness...

Hot Food Display: Enhancing Presentation and Freshness

In the world of food service, presentation is just as important as taste. Whether in cafés, restaurants, bakeries, or convenienc...



To read a full copy of the report, Rethinking Tactics: 2022 Annual Cybersecurity Report, please visit: https://www.trendmicro.com/vinfo/hk/security/research-and-analysis/threat-reports/roundup/rethinking-tactics-annual-cybersecurity-roundup-2022

Jon Clay, VP of threat intelligence at Trend Micro: "The unrivaled breadth of Trend Micro threat intelligence* reveals 2022 as a year when threat actors went 'all-in' to boost profits. A surge in backdoor detections is particularly concerning in showing us their success in making landfall inside networks. To manage risk effectively across a rapidly expanding attack surface, stretched security teams need a more streamlined, platform-based approach."

The roundup report reveals several interesting trends for 2022 and beyond:

The top three MITRE ATT&CK techniques show us that threat actors are gaining initial access through remote services, then expanding their footprint within the environment through credential dumping to utilize valid accounts.

An 86% increase in backdoor malware detections reveals threat actors trying to maintain their presence inside networks for a future attack. These backdoors primarily targeted web server platform vulnerabilities.

A record number of Zero Day Initiative (ZDI) advisories (1,706) for the third year in a row is the result of a rapidly expanding corporate attack surface and researcher investment in automated analysis tools, which are finding more bugs. The number of critical vulnerabilities doubled in 2022. Two out of the top three CVEs reported in 2022 were related to Log4j.

The ZDI observed an increase in failed patches and confusing advisories, adding extra time and money to corporate remediation efforts and exposing organizations to unnecessary cyber risk.

Webshells were the top-detected malware of the year, surging 103% on 2021 figures. Emotet detections were second after undergoing something of a resurgence. LockBit and BlackCat were the top ransomware families of 2022.

Ransomware groups rebranded and diversified in a bid to address declining profits. In the future, we expect these groups to move into adjacent areas that monetize initial access, such as stock fraud, business email compromise (BEC), money laundering, and cryptocurrency theft.

Trend Micro recommends that organizations adopt a platform-based approach to managing the cyber-attack surface, mitigate security skills shortages and coverage gaps, and minimize the costs associated with point solutions. This should cover the following:

  • Asset management. Examine assets and determine their criticality, any potential vulnerabilities, the level of threat activity, and how much threat intelligence is being gathered from the asset.
  • Cloud security. Ensure that cloud infrastructure is configured with security in mind to prevent attackers from capitalizing on known gaps and vulnerabilities.
  • Proper security protocols. Prioritize updating software as soon as possible to minimize the exploitation of vulnerabilities. Options such as virtual patching can help organizations until vendors provide official security updates.
  • Attack surface visibility. Monitor disparate technologies and networks within the organization, as well as any security system that protects them. It may be difficult to correlate different data points from siloed sources.
* It covers endpoints (Android & iOS, IoT, IIoT, PCs, Macs, Linux, servers), email, web and network layers, OT networks, cloud, home networks, vulnerabilities, consumers, businesses, and governments globally.

Hashtag: #TrendMicro

The issuer is solely responsible for the content of this announcement.

About Trend Micro

Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 65 countries, Trend Micro enables organizations to simplify and secure their connected world.

IN THE NEWS

Sutherland Shire Electrician’s Tips to Slash Your Electricity Bill

Right now, people all over the world are sharing their electricity bill slashing tips. This has promp.

Buying a Chiropractic Table? Here's 7 Things to Look For

You can accomplish your best work if you have the correct tools. A chiropractic table must not bounce.

Daphne Announces 2024 Interim Results

Revenue and Profit Attributable to Shareholders up 54% and 83% respectively Proactive in Seeking Change.

Prince Foundation Hosts Interview Day for Chen Zhi Scholarship Batch 4, Supporting Talented Students…

PHNOM PENH, CAMBODIA - Media OutReach Newswire - 4 March 2025 - Prince Foundation, the philanthropic arm.

International Experts Highlight Contemporary Value of Confucianism at The 10th Nishan Forum on World…

BEIJING, CHINA - Media OutReach Newswire - 12 July 2024 - "The essence of Confucianism is to promote soc.

What to do if you struggle to fall asleep

"We all know the agony of not being able to sleep when you really want to, and the exhaustion that fo.

Health & Wellness

Sleep Dentistry for Anxiety: How Modern Treatment Helps Patients Relax

Hashtag.net.au - avatar Hashtag.net.au

For many people, dental anxiety isn’t just a minor worry — it’s a barrier that keeps them from getting the care they need. The sound of drills, the sterile scent, or even a simple check-up can cause h...

How to Choose the Right Earplugs for Sleeping: A Comprehensive Guide

Hashtag.net.au - avatar Hashtag.net.au

Getting a restful night's sleep is essential for overall health and well-being. For many, external noises—be it a snoring partner, traffic, or noisy neighbors—can disrupt sleep patterns. One effective...

How Teen Depression Differs from Normal Adolescent Mood Swings

Hashtag.net.au - avatar Hashtag.net.au

Adolescence is often described as a turbulent period of life. Hormonal changes, social pressures, academic stress, and the search for identity all combine to make the teenage years emotionally inten...