Category Archives: Cybercrime and Cyber Attacks

Wanted: 10 years of experience in a security technology only 5 years old…

Guest blog by Greg Young (Vice President for Cybersecurity)

Most analysis is that the cybersecurity skills gap or shortage is getting worse. ESG reported in CSOOnline that 2018 had the highest levels, at 51%, where organizations “claimed their organization had a problematic shortage of cybersecurity skills.”

It’s a complex problem, but we believe with non-complex solutions.

Continue reading

BEC – High maintenance cybercrime generates high profits…

for the criminals.

Forget ransomware, BEC is the threat you should probably fear most of all. Unlike ransomware, which locks victims out of their systems using a strong encryption tool, Business Email Compromise (BEC) uses far less obvious and more sophisticated mechanisms which makes them harder to detect and easier to fall victim to. The effort for criminals is higher but the ROI (to put it in business terms) is definitely worth it.  Continue reading

What is Shadow OT and why you should know what it is:

Shadow IT

Photo by Lewis Burrows from Pexels

Yes, you read it correctly: Shadow OT, with an O. We have barely managed to deal with Shadow IT, and a new threat already looms at the horizon. Operational Technology (OT) has become as affordable and available as IT, which leads to yet another cause of IT management worries.   

Continue reading

Why Blockchain offers both opportunities and threats to financial service providers: 

Cryptohacking is on the rise

Cryptohacking is on the rise

Very few technologies have enjoyed as much attention lately as blockchain. Most industries are investigating the opportunities offered by this technology to their business. And financial services, with bitcoin and other cryptocurrencies as a striking example, probably even more so than others. Blockchain does indeed offer quite a few opportunities, but there are also some threats involved.  

Continue reading

No more airtime for hackers at RTL Belgium 

No more airtime for hackers at RTL Belgium

No more airtime for hackers at RTL Belgium

RTL Belgium, a subsidiary of Europe’s largest commercial broadcasting group, is market leader in French-speaking Belgium. Every day, over two million people view one of their television channels and their radio stations reach almost 600,000 listeners every day. “Media groups have a big impact on our daily lives. So you can imagine that we are becoming a more and more interesting target for hackers”, says Maxime Masset, IT Security Systems Administrator.

Continue reading

Why digital extortion works better than blackmail

Door David Sancho, Senior Antivirus Researcher, Trend Micro

Smart cybercriminals rely on rational decisions

Cybercriminals today are going all in with digital extortion. Their business model isn’t exactly new. “I want you to do this, or I’ll break your legs”, is easily translated to “I want you to do this, because I have your data.” Extortion has always existed and it’s a brilliant business model, albeit an unethical one. Therefore, I’m not at all surprised by the popularity of the digital variant today. You only have to look at the massive succes of ransomware to see wat I mean. Continue reading

Zero Day vulnerabilities and no updates? No reason to panic!

Guest blog by Chris Van Den Abbeele – Global Solution Architect Datacenter en Cloud Security, Trend Micro

Automated virtual patching raises your security level and lowers your operational expenses.

Updating can be a painful process. It takes a lot of time, isn’t without risk and inherently leads to downtime. Virtual updates are just as safe, immediately available and best of all, free of complications. Physical updates remain a necessity, but in order to address the most urgent issues, you’re better off going virtual. Continue reading

Revealing the True Cyber-Risks Facing Connected Healthcare Providers

Guest blog by Greg Young, VP cybersecurity Trend Micro

Technology is the beating heart of any modern hospital. Advances in cloud, IoT and digital IT systems have helped healthcare organizations (HCOs) greatly improve the quality of care offered to patients. Electronic health records are the backbone of an increasingly complex patient care network.  But it has also exposed them to even greater risks of data theft and operational outages. A new report from Trend Micro and HITRUST reveals that at any one time there could be at least as many as 80,000 exposed systems in hospitals worldwide. The biggest finding is we also found a worrying disconnect or gap between current perceptions versus reality. Continue reading