Trellix logo
Trellix Xpand Live
Register Now

September 27-29, 2022 ARIA Hotel & Casino Save the date and start planning to align with our leadership teams to learn our vision for a new kind of cybersecurity and learn more about our innovations in cyber intelligence and XDR architecture.

Trellix CEO
Our CEO on Living Security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.

Gartner Marketplace Guide (XDR)
Gartner® Report: Market Guide for XDR

As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."

The Threat Report - Summer 2022
Latest Report

Our Summer 2022 threat report details the evolution of Russian cybercrime, research into medical devices and access control systems, and includes analysis of email security trends.

Critical Flaws in Widely Used Building Access Control System
Critical Flaws in Widely Used Building Access Control System

At Hardwear.io 2022, Trellix researchers disclosed 8 zero-day vulnerabilities in HID Global Mercury access control panels, allowing them to remotely unlock and lock doors, modify and configure user accounts and subvert detection from management software.

Trellix CEO
Our CEO on Living Security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.

Trellix Xpand Live
Register Now

September 27-29, 2022 ARIA Hotel & Casino Save the date and start planning to align with our leadership teams to learn our vision for a new kind of cybersecurity and learn more about our innovations in cyber intelligence and XDR architecture.

Stories

The latest cybersecurity trends, best practices,
security vulnerabilities, and more

Executive Summary: Organizations and Nation-State Cyber Threats

Traditionally when we talk about threat actors, we first need to make the split between cybercrime and nation-state sponsored operations. Where cybercrime is mostly focused on financial gain, nation-state operations are often conducting strategic attacks to disrupt an adversary or in it for the long run, conducting intelligence operations to gain intellectual property to serve an economic or military goal.

However, over the years those lines have blurred and with the recent leaks of the chats of the Conti and Trickbot crews, government involvement cannot be excluded as the chats hinted towards State influenced cybercrime behaviour. Our team recently launched a new report – In the Crosshairs: Organizations and Nation-State Cyber Threats – written by the Center for Strategic and International Studies (CSIS) and based on a survey of 800 IT decision makers by Vanson Bourne. We sought to understand: are security teams capable, with their current technology and skills, to differentiate between these two and are they able to respond accordingly? This report digs into answering this questions and how global companies are coping with the cybersecurity challenges that come with nation-state threat actors.

Another change we have observed over the years is that, in most conversations when we talk about cyber incidents, the word “data” is used generically, like “the actors were after classified or sensitive data.” What exactly do we mean by data? Is it the intellectual property the actors are after? Or is it the data that will show them how to lateral move through the network? In other words, was the data that was stolen used in achieving the threat actor’s objective or was obtaining the data the actual objective? With the shift to an ‘always-on economy,’ attackers started to encrypt the data to impact the availability of the services? And if that is not enough, the actors are more than happy to leak data if they’re not paid fast enough, or a company refuses to pay because they have a working backup and recovery process in place.

One of the surprising outcomes of our survey is that respondents mentioned outdated infrastructure. We would expect that investments are yearly made to keep the infrastructure up to date, to serve the demands and changes that are constantly happening. Combined with responses around the cybersecurity skills shortage and an observed increase of cyber-attacks over the years, concerns raised about outdated security technology should raise a call to action across both the private and public sector. On top of that 10 percent answered honestly that there was no security strategy. Concerning in the light of the increasing number of cyber-attacks over the years. Whether it is nation-state or cybercrime-related, being able to detect, block and protect is key, and key to keep our society running.

Featured Content

Get the latest

We’re no strangers to cybersecurity. But we are a new company.
Stay up to date as we evolve.

Please enter a valid email address.
Zero spam. Unsubscribe at any time.