{"id":12559,"date":"2020-09-28T08:45:34","date_gmt":"2020-09-28T04:45:34","guid":{"rendered":"https:\/\/techxmedia.com\/?p=12559"},"modified":"2025-04-18T00:21:30","modified_gmt":"2025-04-17T20:21:30","slug":"trend-micro-blocked-8-8-million-covid-19-cyber-threats","status":"publish","type":"post","link":"https:\/\/techxmedia.com\/en\/trend-micro-blocked-8-8-million-covid-19-cyber-threats\/","title":{"rendered":"Trend Micro blocked 8.8 million COVID-19 cyber threats during H1 2020"},"content":{"rendered":"\n<p>Trend Micro Incorporated\u00a0has released its annual <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/securing-the-pandemic-disrupted-workplace-trend-micro-2020-midyear-cybersecurity-report\">mid-year roundup report<\/a>, which reveals COVID-19 related threats as the single largest type of threat in the first half of the year. In just six months, Trend Micro blocked 8.8 million COVID-19 related threats, nearly 92% of which were spam delivered via emails.<\/p>\n\n\n\n<p>Cybercriminals shifted their focus from January through June to take advantage of global interest in the pandemic. The risk to <a href=\"https:\/\/techxmedia.com\/tag\/businesses\/\">businesses <\/a>was compounded by security gaps created by a completely remote workforce.<\/p>\n\n\n\n<p>During the first half of 2020, the <a href=\"https:\/\/techxmedia.com\/tag\/uae\/\">UAE <\/a>experienced a combined 13,100,616 email, URL, and <a href=\"https:\/\/techxmedia.com\/tag\/malware\/\">malware threats<\/a> detected. The <a href=\"https:\/\/techxmedia.com\/tag\/uae\/\">UAE<\/a> saw 6,042,459 email threats, 6,187,404 URL victims, 34,360 URL hosted, and 836,393 <a href=\"https:\/\/techxmedia.com\/tag\/malware\/\">malware detections<\/a>. <a href=\"https:\/\/techxmedia.com\/tag\/ransomware\/\">Ransomware<\/a> continues to be a major issue. The UAE\u2019s ransomware attacks count for 4.27% of the world\u2019s <a href=\"https:\/\/techxmedia.com\/tag\/ransomware\/\">ransomware attacks<\/a>.<\/p>\n\n\n\n<p>The Gulf Cooperation Council (GCC) saw 56,870,977 combined email, URL, and <a href=\"https:\/\/techxmedia.com\/tag\/malware\/\">malware threats<\/a> detected during the first half of 2020. <a href=\"https:\/\/techxmedia.com\/tag\/cyber-threats\/\">Cyber-threats<\/a> included 41,236,550 email threats, 13,181,016 URL victims, 2,392,097 <a href=\"https:\/\/techxmedia.com\/tag\/malware\/\">malware detections<\/a>, and 61,314 URL hosted threats.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/techxmedia.com\/wp-content\/uploads\/2020\/09\/Majd-Sinan-Trend-Micro-inside.jpg\" alt=\"Majd-Sinan,-Trend-Micro-techxmedia\" class=\"wp-image-12562\" width=\"122\" height=\"166\" srcset=\"https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2020\/09\/Majd-Sinan-Trend-Micro-inside.jpg 559w, https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2020\/09\/Majd-Sinan-Trend-Micro-inside-219x300.jpg 219w\" sizes=\"auto, (max-width: 122px) 100vw, 122px\" \/><\/figure><\/div>\n\n\n\n<p>\u201cThe <a href=\"https:\/\/techxmedia.com\/tag\/uae\/\">UAE<\/a> and the GCC\u2019s high levels of cyber- attacks show that while the pandemic has dominated all of our lives during the first half of 2020, it\u2019s not slowing down the cybercriminals,\u201d said Majd Sinan, Country Manager \u2013 UAE, Trend Micro. \u201cThe UAE\u2019s IT leaders must continue to adapt their cybersecurity strategies to account for increased threats to their new normal. That means protecting remote endpoints, cloud systems, user credentials and VPN systems, as well as refreshing training courses to turn that newly dispersed workforce into a more effective first line of defense.\u201d<\/p>\n\n\n\n<p>In total, Trend Micro blocked 27.8 billion <a href=\"https:\/\/techxmedia.com\/tag\/cyber-threats\/\">cyber threats<\/a> in the first half of 2020, 93% of which were email-borne.<\/p>\n\n\n\n<p>Business Email Compromise (BEC) detections increased by 18% from the second half of 2019, in part due to scammers trying to capitalize on home workers being more exposed to social engineering.<\/p>\n\n\n\n<p>Among all the threats in the first half of the year, ransomware was a constant factor. Although the number of detected <a href=\"https:\/\/techxmedia.com\/tag\/ransomware\/\">ransomware threats<\/a> decreased, Trend Micro saw a 36% increase in new ransomware families compared to the same time last year.<\/p>\n\n\n\n<p>Global organizations have also been burdened by a significant spike in newly disclosed vulnerabilities. Trend Micro\u2019s Zero Day Initiative (ZDI) published a total of 786 advisories, representing a 74% increase from the second half of 2019. Some of these came as part of Microsoft Patch Tuesday updates, which have fixed an average of 103 CVEs per month so far in 2020 \u2014 including the largest number of patches ever issued in a single month (129) in June.<\/p>\n\n\n\n<p>Trend Micro also observed a 16% increase in vulnerabilities disclosed in industrial control systems (ICS), compared to the first half of 2019, which could create major challenges for smart factory owners and other organizations running IIoT environments.<\/p>\n\n\n\n<p>To effectively protect dispersed corporate networks, Gartner recommends <a href=\"https:\/\/techxmedia.com\/tag\/businesses\/\">businesses <\/a>\u201crefine security monitoring capabilities to reflect an operating environment where network traffic patterns, data and system access vectors have changed due to increased remote and mobile operations.\u201d Trend Micro XDR helps customers do exactly that by correlating security events across the entire IT environment, which is critical for holistic protection in the second half of 2020.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals shifted their focus from January through June to take advantage of global interest in the pandemic. The risk to businesses was compounded by security gaps created by a completely remote workforce.<\/p>\n","protected":false},"author":8,"featured_media":12563,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1595,9621],"tags":[3723,1315,2403,771,801,3722,2026,73],"contributor":[],"class_list":["post-12559","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-emerging-technologies","tag-business-email-compromise","tag-businesses","tag-cyber-threats","tag-malware","tag-ransomware","tag-ransomware-attacks","tag-trend-micro","tag-uae"],"featured_image_src":"https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2020\/09\/covid-19-cybersecurity-threats-featured.jpg","author_info":{"display_name":"Rabab","author_link":"https:\/\/techxmedia.com\/en\/author\/rabab\/"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts\/12559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/comments?post=12559"}],"version-history":[{"count":0,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts\/12559\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/media\/12563"}],"wp:attachment":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/media?parent=12559"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/categories?post=12559"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/tags?post=12559"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/contributor?post=12559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}