Trend Micro Research, News and Perspectives
Importance of Scanning Files on Uploader Applications
1 year 9 months ago
Delve into the crucial practice of file scanning within uploader applications, and learn defensive measures to safeguards against malicious threats like malware.
Fernando Cardoso
Cybersecurity Decluttered: A Journey to Consolidation
1 year 9 months ago
Learn how far cybersecurity has come from scattered resources to consolidation the future.
David Ng
Fileless Attacks Prompt Intel’s Next-Gen Security
1 year 9 months ago
Discover how Trend is strengthening its endpoint solutions to detect fileless attacks earlier. By leveraging Intel Threat Detection Technology, Trend enhances the scalability and resiliency of its solutions.
Lonny Huffar
How Red Team Exercises Increases Your Cyber Health
1 year 9 months ago
Delve into the world of red team exercises, their vital role in enhancing organizational security through simulated cyberattacks, including tactics like phishing and lateral movement within networks, and understand the need for regular testing and improvement to counter evolving threats effectively.
Johnny Krogsboll
Cyberespionage Group Earth Hundun's Continuous Refinement of Waterbear and Deuterbear
1 year 9 months ago
Our blog entry provides an in-depth analysis of Earth Hundun's Waterbear and Deuterbear malware.
Cyris Tseng
Why a Cloud Security Platform Approach is Critical
1 year 10 months ago
Explore how a cybersecurity platform with attack surface management and runtime protection capabilities can enhance your cloud security posture.
Fernando Cardoso
Unveiling the Fallout: Operation Cronos' Impact on LockBit Following Landmark Disruption
1 year 10 months ago
Our new article provides key highlights and takeaways from Operation Cronos' disruption of LockBit's operations, as well as telemetry details on how LockBit actors operated post-disruption.
Christopher Boyton
Checked
3 hours 52 minutes ago