DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

Trend Micro Blocks 160 billion Incidents in 2023

DigitalCIO Bureau by DigitalCIO Bureau
March 14, 2024
in Tech News
0
Sophos Named A Leader In 2023 Gartner Report
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Trend Micro has revealed a 10% annual increase in total threats blocked in 2023 and warned that attackers are using more advanced methods to target fewer victims with the potential for higher financial gains.

Jon Clay, VP of threat intelligence at Trend: “We’re blocking more threats than ever before for our customers. But understand that adversaries showed a variety and sophistication of TTPs in their attacks, especially in defense evasion. As our report demonstrates, network defenders must continue to proactively manage risk across the entire attack surface today. Understanding the strategies favored by our adversaries is the foundation of effective defense.”

Trend Micro blocked 161 billion threats overall in 2023, compared to 82 billion threats five years ago. In 2023, threats blocked by email and web reputation dropped annually by 47% and 2%, respectively. Threats blocked by Trend’s Mobile Application Reputation Service (-2%), Smart Home Network (-12%), and Internet of Things Reputation Service (-64%) also declined. However, there was a 35% annual increase in threats blocked under Trend’s File Reputation Service (FRS).

This could indicate that threat actors are choosing their targets more carefully. Instead of launching attacks on a wider range of users and relying on victims clicking on malicious links in websites and emails, they’re targeting a smaller number of higher-profile victims with more sophisticated attacks. This might enable them to bypass early detection layers like network and email filters—which could explain the surge in malicious file detections at endpoints.

Some other trends observed in the report include:

  • APT actors showed a variety and sophistication of their attacks against victims, especially around defense evasion tactics.
  • Email malware detection surged by 349% year-on-year (YoY), while malicious and phishing URL detections declined by 27% YoY – again highlighting the trend for more using malicious attachments in their attacks.
  • Business email compromise (BEC) detections increased 16% YoY.
  • Ransomware detections dropped 14% YoY. However, once again, the increase in FRS detections may indicate that threat actors are getting better at evading primary detection via techniques such as Living-Off-The-Land Binaries and Scripts (LOLBINs/LOLBAs), Bring Your Own Vulnerable Driver (BYOVD), zero-day exploits, and AV termination.
  • Linux and MacOS ransomware attacks were 8% of the overall ransomware detections.
  • There was an increase in remote encryption, intermittent encryption, EDR bypass using unmonitored virtual machines (VMs), and multi-ransomware attacks where victims were hit more than once. Adversaries have recognized EDR as a formidable defense but are now utilizing bypass tactics to get around this technology.
  • Thailand and the US were the top two ransomware victim countries, with banking as the most affected sector.
  • The top MITRE ATT&CK detections were defense evasion, command & control, initial access, persistence, and impact
  • Risky cloud app access was the top risk event detected by Trend’s attack surface risk management (ASRM), recorded almost 83 billion times.
  • Trend’s Zero Day Initiative discovered and responsibly disclosed 1914 zero-days, up 12% YoY. These included 111 Adobe Acrobat and Reader bugs. Adobe was the number one vendor for vulnerability reporting, and PDFs were the number one spam attachment type.
  • Windows applications were the top 3 vulnerabilities exploited through detections from our virtual patches.
  • Mimikatz (used in data harvesting) and Cobalt Strike (used in Command & Control) continued to be the preferred legitimate tools to abuse to aid criminal activity.

 

In light of these findings, Trend advises network defenders to:

  • Work with trusted security vendors with a cybersecurity platform approach to ensure resources are not only secured but also continuously monitored for new vulnerabilities.
  • Prioritize SOC efficiency by monitoring cloud applications carefully as they become more closely integrated into day-to-day operations.
  • Ensure all the latest patches/upgrades are applied to operating systems and applications.
  • Utilize comprehensive security protocols to safeguard against vulnerabilities, tighten configuration settings, control application access, and enhance account and device security. Look to detect ransomware attacks earlier in the attack lifecycle by shifting left in defenses during initial access, lateral movement, or data exfiltration stages.
Tags: Trend Micro
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Largest Global Data Breach: Comment From Bernard Montel, Technical Director And Security Strategist At Tenable

by DigitalCIO Bureau
June 25, 2025
0
Largest Global Data Breach: Comment From Bernard Montel, Technical Director And Security Strategist At Tenable

"Firstly, this is not a new data breach. It’s the result of threat actors’ use of infostealer malware that has silently scraped usernames and passwords during breaches. This...

Read moreDetails

Ascendion Acquires Product Strategy & Transformation Firm Moodys

by DigitalCIO Bureau
June 25, 2025
0
Ascendion Leads The Charge in Generative AI

Ascendion has announced the acquisition of Moodys Northwest Consulting (Moodys), a premier product strategy and transformation firm. The move strengthens Ascendion's ability to help enterprise clients imagine, build,...

Read moreDetails

AuthBridge Unveils GroundCheck.ai for Smarter CPV

by DigitalCIO Bureau
June 25, 2025
0
AuthBridge Unveils GroundCheck.ai for Smarter CPV

AuthBridge, India's leading trust and authentication technology company, has launched GroundCheck.ai — India's first AI-powered platform purpose-built to transform Contact Point Verification (CPV) for customers, merchants, and vendors across sectors. At...

Read moreDetails

C-Suite misalignment over GenAI adoption

by DigitalCIO Bureau
June 25, 2025
0
L&T Tech Services Accelerates Transition to Smart Vehicles with Generative AI on AWS

NTT DATA has launched its new report, “The AI Security Balancing Act: From Risk to Innovation,” highlighting the opportunities and risks AI presents in cybersecurity. The findings show...

Read moreDetails

Zithara was conceived as a highly modular platform; Co-founder-Varun Kashyap

by DigitalCIO Bureau
June 23, 2025
1
Zithara was conceived as a highly modular platform; Co-founder-Varun Kashyap

Our team works closely with clients to identify new revenue levers, optimize existing customer journeys, and continuously unlock incremental value. This outcome-driven partnership approach is what transforms us...

Read moreDetails
Next Post
LRN Appoints New Leadership For Asia-Pacific Region

Schneider Electric Appoints Arvind Kakru To Lead Industrial Automation Business for Greater India Zone

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Coforge and Newgen Elevates Partnership

Co-op Expands Partnership with TCS

February 21, 2024

Eurotech Unveils Advanced Cable Cubby Enclosures

December 2, 2019

92% of Indian software developers believe AI Agents to be as Essential As Traditional Software Tools

April 17, 2025

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Dell Technologies Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud HCLTech Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?