1. Homepage
  2. Equities
  3. Japan
  4. Japan Exchange
  5. Trend Micro
  6. News
  7. Summary
    4704   JP3637300009

TREND MICRO

(4704)
  Report
Delayed Japan Exchange  -  05/24 02:00:00 am EDT
7430.00 JPY   -0.40%
05/16Cyber professionals gathered at Helsinki Expo and Convention Centre after a three years' break
AQ
04/25TREND MICRO : New Partner Bit Discovery Helps TM with Attack Surface
PU
04/25Trend Micro Announces the Launch of Trend Micro One, a Unified Cybersecurity Platform
CI
SummaryQuotesChartsNewsRatingsCalendarCompanyFinancialsConsensusRevisions 
SummaryMost relevantAll NewsOther languagesPress ReleasesOfficial PublicationsSector news

Trend Micro Incorporated : This Week in Security News - January 7th, 2022

01/07/2022 | 12:48pm EDT

Read on:

Are Endpoints at Risk for Log4Shell Attacks

The end of 2021 saw the emergence of the Log4Shell (CVE-2021-44228) vulnerability, a critical vulnerability in the ubiquitous Java logging package Apache Log4j. Exploiting Log4Shell via crafted log messages can allow an attacker to execute code on remote machines. The potential impact of this vulnerability is great enough that it scores a 10.0 rating based on CVSS version 3.x and a 9.3 rating based on CVSS version 2.0 in terms of critical risk.

Google Confirms It Acquired Cybersecurity Specialist Siemplify

Google confirmed that it has acquired Siemplify, an Israel-based cybersecurity startup that specializes in end-to-end security services for enterprises, automation and response (SOAR) services. The acquisition verifies that Siemplify will be integrated into Google Cloud Platform, specifically its Chronicle operation, expanding Google's footprint in the cybersecurity industry.

What to Do About Log4j

Log4j poses some deep challenges to IT. This article discusses some tactical measures people are already taking now and over the next week or two, and some strategic guidance for what to do after the immediate crisis abates.

FTC Warns Companies to Patch Log4j or Face Potential Lawsuits

Since its discovery in early December, Log4j has forced droves of the web's biggest companies to scramble and patch their products and systems before criminal hackers can get at them. The FTC issued a stern warning to companies that may not be fully prioritizing this process and will "use its full legal authority to pursue companies that fail to take reasonable steps to protect consumer data from exposure as a result of Log4j, or similar known vulnerabilities in the future.

The Log4j Story, and How It Has Impacted Our Customers

Trend Micro's latest customer data reveals just how significant the global and vertical reach of Log4Shell is, and the huge range of applications it impacts. That's why Trend Micro is continuing to research potential new vectors and Log4j vulnerabilities, and helping organizations better understand where they may be exposed.

iOS Malware Can Fake iPhone Shutdowns to Snoop on Camera, Microphone

Researchers have developed a new technique that fakes a shutdown or reboot of iPhones, preventing malware from being removed and allowing hackers to secretly snoop on microphones and receive sensitive data via a live network connection.

Examining Log4j Vulnerabilities in Connected Cars and Charging Stations

In this blog, Trend Micro looks into how Log4j vulnerabilities affect devices or properties embedded in or used for connected cars, specifically chargers, in-vehicle infotainment systems, and digital remotes for opening cars.

Uber Bug, Ignored for Years, Casts Doubt on Official Uber Emails

A simple-to-exploit bug that allows bad actors to send emails from Uber's official system went unaddressed despite flagging by multiple researchers. Since the story was first reported, Uber has fixed the vulnerability. However, because it's unknown whether the vulnerability has been exploited in the years that it existed, customers who gave up personal information in response to an official Uber email should take action to change their passwords immediately.

Staging a Quack: Reverse Analyzing a Fileless QAKBOT Stager

Further monitoring and analysis of Squirrelwaffle from Trend Micro's incident response and extended detection and response teams (IR/XDR) found that one of Squirrelwaffle's payloads includes QAKBOT, a banking trojan and infostealer that cybercriminals have been using since 2007. While QAKBOT is one of the payloads it stages filelessly in the registry, the stager is also capable of staging for more than one malware, a capability that can likely be abused for more campaigns in the future.

New Attack Campaign Exploits Microsoft Signature Verification

Security researchers are observing a new campaign in which attackers abuse the Microsoft e-signature verification to deploy Zloader, a banking malware designed to steal user credentials and private information.

Ransomware Spotlight: REvil

Now that the reign of REvil has come to an end, it's time to regroup and strategize. What can organizations learn from REvil's tactics? In this blog, Trend Micro reviews the rise, downfall, and future of its operations using insights into the group's arsenal and inner workings.

What do you think about the Uber email bug? Share in the comments below or follow me on Twitter to continue the conversation: @JonLClay.

Disclaimer

Trend Micro Inc. published this content on 07 January 2022 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 07 January 2022 17:47:03 UTC.


© Publicnow 2022
All news about TREND MICRO
05/16Cyber professionals gathered at Helsinki Expo and Convention Centre after a three years..
AQ
04/25TREND MICRO : New Partner Bit Discovery Helps TM with Attack Surface
PU
04/25Trend Micro Announces the Launch of Trend Micro One, a Unified Cybersecurity Platform
CI
04/24TREND MICRO : How to better manage your digital attack surface risk
PU
04/20TREND MICRO : Spring4Shell Vulnerability CVE-2022-22965 Exploited to Deploy Cryptocurrency..
PU
04/19CRITICALLY UNDERRATED : Studying the Data Distribution Service (DDS) Protocol
PU
04/18TREND MICRO : An Investigation of the BlackCat Ransomware via Trend Micro Vision One
PU
04/18CYBER RISK INDEX (2H' 2021) : An Assessment for Security Leaders
PU
04/13OT cybersecurity provider TXOne Networks expands its presence in Europe
AQ
04/08CVE-2022-22965 : Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing a..
PU
More news
Financials
Sales 2022 207 B 1 622 M 1 622 M
Net income 2022 32 018 M 251 M 251 M
Net cash 2022 213 B 1 666 M 1 666 M
P/E ratio 2022 32,4x
Yield 2022 2,21%
Capitalization 1 041 B 8 147 M 8 147 M
EV / Sales 2022 4,00x
EV / Sales 2023 3,67x
Nbr of Employees 7 024
Free-Float 94,6%
Chart TREND MICRO
Duration : Period :
Trend Micro Technical Analysis Chart | MarketScreener
Full-screen chart
Technical analysis trends TREND MICRO
Short TermMid-TermLong Term
TrendsBullishBullishBullish
Income Statement Evolution
Consensus
Sell
Buy
Mean consensus HOLD
Number of Analysts 12
Last Close Price 7 460,00 JPY
Average target price 7 150,00 JPY
Spread / Average Target -4,16%
EPS Revisions
Managers and Directors
Yi Fen Chen Auditor
Mahendra Negi Group CFO, COO & Representative Director
Ming Jang Chang Representative Director
Oscar Chang Executive Vice President-Research & Development
Max Cheng Chief Information Officer & Executive VP
Sector and Competitors
1st jan.Capi. (M$)
TREND MICRO16.74%8 147
MICROSOFT CORPORATION-22.50%1 949 410
DASSAULT SYSTÈMES SE-26.30%53 999
SYNOPSYS INC.-16.69%46 998
ATLASSIAN CORPORATION PLC-53.40%45 175
SEA LIMITED-65.47%43 240