Story image

Built-in email security measures inadequate - Trend Micro

05 Mar 2019

Cybersecurity solutions provider Trend Micro has announced that its Cloud App Security tool blocked nearly nine million high-risk email threats in 2018 as attackers continued to evolve their tactics.

The findings from Trend Micro’s Cloud App Security report detail how escalating email threat levels are exposing organisations to an increased risk of fraud, spying, information theft, and spoofing.

As email remains a staple communication and collaboration tool globally, it is convenient for cybercriminals to leverage this integral, trusted platform for compromising attacks.

“Organisations are increasingly looking to cloud email services to boost productivity and agility, but the Cloud App Security report reveals that—from credential phishing to business email compromise (BEC) and the use of unusual file types—hackers are employing a variety of new tactics to evade built-in controls, making it critical to invest in a second layer of defence,” says Trend Micro A/NZ technical director Mick McCluney.

As the report reveals, email remains one of the most popular threat vectors.

In total, the solution detected and blocked nearly 9 million high-risk email threats in 2018.

This number was even after Cloud App Security was used as a second filter for emails that passed through Office 365.

A Trend Micro customers’ detection result is available in the report.

This underscores that sophisticated, multi-layered security is imperative for cloud-based email security as part of the shared responsibility model.

McCluney says, “While Microsoft’s internal controls are a great starting point, organisations must take shared responsibility for security in the cloud. Think of third-party email protection as the tyres of your favourite car — an essential add-on.”  

To improve the tool’s detection rates even further, Trend Micro has added new capabilities that combine Computer Vision and Artificial Intelligence technology to “see” fake websites.

This additional technique is applied to suspected phishing emails after filtering based on sender, content, and URL reputation.

The new capabilities sit alongside other Trend Micro email security features.

These strategic offerings include AI-powered Writing Style DNA to combat BEC attacks, machine learning-based detection of suspicious email content, sandbox malware analysis, document exploit detection, and file, email, and web reputation technologies.

Cloud App Security also leverages the Trend MicroSmart Protection Network, which blocked more than 41 billion email threats in 2018.

ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Who's watching you? 
With privacy an increasing concern amongst the public, users should be more aware than ever of what personal data companies hold.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Managing data to comply with privacy regulations - Micro Focus
It’s crucial for organisations to be able to access, understand, and accurately classify the data they have so they know how to treat it.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.