In this year’s Midyear Roundup, we look at the major events in the first half of 2023 and draw a picture of the threat landscape from behaviors and patterns observed in the threat landscape to stay ahead and prepare for risks in the second half of the year.
This report provides an overview of the notable email threats of the past year to help organizations better understand the ever-changing threat landscape. We detail the top email threats of 2022, including the 39.9 million high-risk email threats that we detected using the Trend Micro Cloud App Security platform, a security solution that supplements email providers’ built-in security.
In our midyear security roundup, we highlight the most significant security stories that made a considerable impact on the threat landscape in the first half of 2022 amid a diffused labor pool and a widening digital attack surface.
In this report, we highlight the notable email threats of 2021, including over 33.6 million high-risk email threats (representing a 101% increase from 2020’s numbers) that we’ve detected using the Trend Micro Cloud App Security platform.
We look back at the most significant security issues that emerged in 2021, with insights and recommendations to help organizations bolster their defenses.
In the first half of this year, cybersecurity strongholds were surrounded by cybercriminals waiting to pounce at the sight of even the slightest crack in defenses to ravage valuable assets.
We discuss the notable email threats of 2020 that we found using the Trend Micro Cloud App Security solution, including over 16.7 million high-risk email threats, in addition to those detected by cloud email services’ built-in security.
The upheavals of 2020 challenged the limits of organizations and users, and provided openings for malicious actors. A robust cybersecurity posture can help equip enterprises and individuals amid a continuously changing threat landscape.
Our 2020 Midyear Security Roundup delves into the pertinent challenges faced amid a pandemic, including Covid-19-related threats and targeted ransomware attacks. Read more as we share how to secure systems in this increasingly precarious landscape.