Trend Micro Predicts More Sophisticated Cyber Attacks Will Dominate 2019

Trend Micro Incorporated, a leading cybersecurity solutions, released its 2019 predictions report, warning that attackers will increase the effectiveness of proven attack methods by adding more sophisticated elements to take advantage of the changing technology landscape. The report, Mapping the Future: Dealing with Pervasive and Persistent Threats, highlights the growing threats faced by consumers and organizations that are exacerbated by the increasingly connected world.

“As we head into 2019, organizations must understand the security implications of greater cloud adoption, converging IT and OT, and increasing remote working,” said Greg Young, vice president of cybersecurity for Trend Micro. “Cybercriminals will continue to follow a winning formula – exploiting existing flaws, social engineering and stolen credentials – to drive profits. As both the corporate attack surface and unknown cyber threats increase, it’s more important than ever for organizations to put more resources behind employee education to help protect against these growing attacks.”


IIT Kanpur to Work on Cybersecurity for Government Digital Activities


The role of social engineering in successful attacks against businesses and individuals will continue to increase throughout the year. Since 2015, the number of phishing URLs blocked by Trend Micro has increased by nearly 3,800%. This offsets the lessening reliance on exploit kits, which has decreased by 98% in the same time. Additionally, attackers will continue to rely on known vulnerabilities that remain unpatched in corporate networks for 99.99% of exploits, as this remains a successful tactic.

“The full range of known and unknown threats can never be addressed by one single technology. In 2019, enterprises should not look for a silver bullet, but a mix of threat defense techniques that complement each other and work together,” said Nilesh Jain, Vice President, India and Southeast Asia, Trend Micro.


Cybersecurity in India: How prepared are our companies for a cyberattack?


Trend Micro also predicts attackers will leverage these proven methods against growing cloud adoption. More vulnerabilities will be found in cloud infrastructure, such as containers, and weak cloud security measures will allow greater exploitation of accounts for cryptocurrency mining. This will lead to more damaging breaches due to misconfigured systems.

Attackers will also implement emerging technologies like AI to better anticipate the movements of executives. This will lead to more convincing targeted phishing messages, which can be critical to BEC attacks. Additionally, it is likely that BEC attacks will target more employees who report to C-level executives, resulting in continued global losses.

SIM swapping and SIM-jacking will be a growing threat to take advantage of remote employees and everyday users. This attack method allows criminals to hijack a cell phone without the user’s knowledge, making it difficult for consumers to regain control of their devices. Additionally, the smart home will be an increasingly attractive target for attacks that leverage home routers and connected devices.

 

A word from our Sponsor: Looking for Content Marketing support? Click here.

Navanwita Bora Sachdev

Navanwita is the editor of The Tech Panda who also frequently publishes stories in news outlets such as The Indian Express, Entrepreneur India, and The Business Standard

Recent Posts

Union Budget 2026 Wishlist: “Convert policy into accessible, scalable support for startups & research-led innovation”

Moreover, Budget 2026 expectations for MSMEs are around easier access to working capital, smoother execution…

20 hours ago

Union Budget 2026 Wishlist: What India’s healthtech sector wants from the next phase of healthcare reform

As India’s healthcare ecosystem becomes increasingly digital-first, expectations from the Union Budget 2026 are rising…

21 hours ago

From CISO to risk architect: How security leadership is changing in 2026

For much of the last decade, the CISO role was defined by defense: reduce incidents,…

2 days ago

Union Budget 2026: What India’s Fintech sector wants from the next wave of reforms

As India’s fintech ecosystem matures from rapid experimentation to large-scale adoption, expectations from Union Budget…

2 days ago

Union Budget Expectations: Gaming industry after the ban of real money gaming

The ban on Real-Money Gaming (RMG) in India in 2025 marked a watershed moment for…

2 days ago

From play to powerhouse: How India’s gaming economy is scaling at record speed

India’s gaming story is no longer about casual downloads, it’s about scale, sophistication, and global…

4 days ago