Rethink security priorities

1 April 2019 News & Events, Information Security

Trend Micro recently released its 2018 Security Roundup Report, which depicts a threat landscape that has evolved heavily through both approach and tactics. One shift in attacks that businesses should be aware of is the rapid growth of cryptocurrency mining, which increased 237%. Overall, attacks that capitalise on the human desire to respond to urgent requests from authority are on the rise, such as business email compromise (BEC) and phishing, with phishing URL detections having increased 269% compared to 2017.

“The changes across the threat landscape in 2018 reflect a change in cybercriminal’s mindset,” said Jon Clay, director of global threat communications for Trend Micro. “Today’s most prevalent attacks are targeted and well planned, as opposed to one-size-fits-all attacks of the past. Knowing this pattern, we’re developing products that can outsmart these attack methods and allow us to be one step ahead of the bad guys.”

The number of BEC attacks in 2018 increased by 28%. While these attacks are less frequent than phishing attacks, they are more sophisticated and take more careful planning for cybercriminals and they yield an average of $132 000 per attack. As these attacks contain no malware and go undetected by traditional security measures, companies need to increase their protection against these attacks with smart solutions that analyse the email writing style of key executives in order to identify whether the email may be fraudulent. Trend Micro’s Writing Style DNA does exactly that and effectively helps detect business email compromise (BEC) attacks.

Another area of change across the threat landscape in 2018 was seen in zero-day vulnerabilities. Trend Micro’s Zero Day Initiative (ZDI) bought and disclosed more vulnerabilities in 2018 than ever before, including 224% more industrial control system bugs. This is particularly significant for organisations that struggle to implement patches across their systems. While zero-day exploits are less and less common, known vulnerabilities were used to execute the largest attacks in 2018. These tactics rely on vulnerabilities that have had patches available for months, even years, yet remain exposed in corporate networks.

Another strong indicator of how the threat landscape is shifting can be seen in the types of threats that decline. Ransomware detections decreased by 91% compared to 2017, along with a 45% decrease in new ransomware families. This reinforces the shift in attack tactics, as ransomware does not require extensive planning, technical skills or ingenuity due to the large number of resources available for malicious hackers in the cybercriminal underground.

To find out more on the key developments in the 2018 threat landscape, please visit: https://www.trendmicro.com/vinfo/gb/security/research-and-analysis/threat-reports/roundup/advanced-defenses-for-advanced-email-threats





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
ProtecLink 2025: Ithegi Electronics supports a safer, smarter security ecosystem
News & Events
If you are a security buyer, operations lead, or technology partner, do not miss ProtecLink 2025, to be held in Polokwane on 16 September 2025, at the Polokwane Royal Hotel.

Read more...
Secutel maintains ISO certifications
News & Events Fire & Safety
Secutel Technologies has successfully recertified all four of its ISO standards, a reflection of its continued commitment to excellence, client trust, and operational integrity.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
SABRIC appoints Andre Wentzel as interim CEO
News & Events Financial (Industry) Associations
The South African Banking Risk Information Centre (SABRIC) has announced the appointment of Andre Wentzel as interim chief executive officer, effective immediately.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Paxton cuts emissions by over a third
Paxton News & Events
Paxton has announced a significant reduction in its carbon footprint, cutting emissions by 961 tonnes of CO2e in its 2023 second reporting year.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.