Trend Micro

Businesses compromise on cybersecurity in favor of other goals
90% of IT decision makers claim their business would be willing to compromise on cybersecurity in favor of digital transformation, productivity, or other goals. Additionally, …

Microsoft patches actively exploited Exchange, Excel zero-days (CVE-2021-42321, CVE-2021-42292)
It’s a light November 2021 Patch Tuesday from Microsoft: 55 fixed CVEs, of which two are zero-days under active exploitation: CVE-2021-42321, a Microsoft Exchange RCE, …

BEC attacks: Scammers’ latest tricks
BEC attacks are generally low-volume but, according to a recent survey by GreatHorn, 71% of organizations experienced at least one in the past year. Trend Micro’s latest …

Tom Kellermann joins Attivo Networks Advisory Board
Attivo Networks announced that Tom Kellermann has joined the company’s Advisory Board. Mr. Kellermann joins Attivo’s Advisory board as a highly respected cybersecurity expert …

Microsoft patches actively exploited Windows zero-day (CVE-2021-40449)
On October 2021 Patch Tuesday, Microsoft has fixed 71 CVE-numbered vulnerabilities. Of those, only one was a zero-day exploited in attacks in the wild (CVE-2021-40449) and …
Qumulo Recover Q addresses and defends data protection on-premises and in the cloud
Qumulo unveiled Qumulo Recover Q, a business continuity and disaster recovery solution that bolsters existing strategies to help guard against and react to ransomware threats. …

Ransomware still a primary threat as cybercriminals evolve tactics
Trend Micro announced that it blocked 40.9 billion email threats, malicious files, and malicious URLs for customers in the first half of 2021, a 47% year-on-year increase. …
Trend Micro Service One helps optimize enterprise threat management
Trend Micro launched Trend Micro Service One, consolidating its managed services to optimize enterprise threat management. The new services bundles, which can include premium …

How do I select a container security solution for my business?
The adoption of container architectures is growing steadily, but security and compliance remain top concerns for enterprises, a recent survey revealed. To select a suitable …

Using zero trust to mitigate 5G security challenges
The total number of 5G connections will reach 3.2 billion by 2026, rising from 310 million in 2021, a study from Juniper Research has found. 45% of operators consider it …
Trend Micro strengthens its market presence across AMEA with WeDiscover program
With a focus to strengthen its market presence across Asia Pacific, Middle East, and Africa (AMEA), Trend Micro announced its Channel Partner Demand Generation Program, …

Coinminers, web shells and ransomware made up 56% of malware targeting Linux systems in H1 2021
Trend Micro released a research on the state of Linux security in the first half of 2021. The report gives valuable insight into how Linux operating systems are being targeted …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility