#CulturePH - Security Round Up 2018 - What You Need To Know About Latest Cyber Attacks!

In its recently released Midyear Security Roundup 2018, Trend Micro, a global leader in cybersecurity solutions, noted that cyber criminals are moving away from attention-grabbing ransomware attacks to more covert methods intended to steal money and valuable computing resources. These methods include cryptocurrency mining malware, as well as fileless, macro, and small file malware, just to name a few.  

 “Cybercriminals will constantly shift their tools, tactics and procedures (TTPs) to improve their infection rates,” said Alma Alvarez, Director for Training and Cyber Threat Hunting of Trend Micro. “The spray and pray ransomware attacks we’ve seen in the previous years had become the norm, so attackers changed their tactics to be more covert, using entry vectors not previously seen or used extensively."

“That said, tried and tested tactics still prove effective, as seen in the threats affecting the country and region. IT professionals must evaluate not just their organization’s defenses, but also their own cybersecurity skills and knowledge to ensure sufficient protection is in place to stop these threats. 

“In addition, it’s more important than ever to have a complete, multilayered defense strategy that protects against these attack vectors. The latest attack types require sophisticated detection capabilities, but traditional protections are also required to stop often-overlooked methods of entry that may not be thought of as a risk”,
she added.

Cybercrime and updates in the threat landscape are among the topics discussed in the recently held DECODE security conference hosted by Trend Micro last October 11 at the Makati Shangri-La hotel. Now on its second year, DECODE continues to let Filipino IT professionals in on the most-up-to-date technologies, tools available, and skills that they can use to better secure their organization’s digital infrastructure.

This year’s theme was “Connected Threat Intelligence” and it featured talks and track sessions, given by industry experts and Trend Micro’s own researchers, on Machine Learning and Artificial Intelligence, Internet of Things (IoT) security, reverse engineering, and forensics. With the ever-increasing interconnectivity between devices and organizations in and around the world, the risk of hacking and other security threats likewise become a major concern. 

with Security Engineers Josh and Carmela

Yet all is not lost as participants of DECODE collaborated on how to combat these very threats. And while we cannot get all these threats all in one go, DECODE is a good start and shows everyone that there is something that can be done to help keep our interconnected world safe from whatever threat is out there. 

You can follow me on TwitterInstagram and Facebook!
Subscribe to my YouTube Channel.
Thank you!

DISCLAIMER: All content provided on this blog is for informational purposes only. The owner of this blog makes no representations as to the accuracy or completeness of any information on this site or found by following any link on this site. The pictures or videos posted here doesn't necessarily mean that it's the owner's property. The owner will not be liable for any errors or omissions in this information nor for the availability of this information. The owner will not be liable for any losses, injuries, or damages from the display or use of this information. 


Popular Posts