Trend Micro

Apple fixes macOS zero-day exploited by malware (CVE-2021-30713)
A zero-day vulnerability (CVE-2021-30713) that allowed XCSSET malware to surreptitiously take screenshots of the victim’s desktop has been fixed by Apple on macOS 11.4 …

May 2021 Patch Tuesday: Adobe fixes exploited Reader 0-day, Microsoft patches 55 holes
On this May 2021 Patch Tuesday: Adobe has fixed a Reader flaw exploited in attacks in the wild, as well as delivered security updates for eleven other products, including …
Trend Micro and Snyk launch SaaS solution to improve visibility and tracking automation
Trend Micro launched a new, co-built SaaS solution with Snyk. It’s designed to provide continuous insight into open source vulnerabilities for enhanced risk management …

New infosec products of the week: May 7, 2021
Assessing third-party security controls with Panorays Smart Questionnaires Unlike manual security questionnaires, Smart Questionnaires include only the questions that are …
Trend Micro unveils OT-native endpoint security solution for ICS environments
Trend Micro announced an OT-native endpoint security solution, provided as part of its total security solution for smart factories. Developed by TXOne Networks, TXOne …

How do I select a DLP solution for my business?
Data loss prevention (DLP) has become even more important in the last year. Since the pandemic has made companies shift to a remote workforce model, cybersecurity threats have …
Trend Micro program drives increases in partner profits and customer success through service expansion
Trend Micro announced a major refresh of the Trend Micro partner program that provide more cloud services resources and rewards partners with additional discounts for enabling …
Fujitsu partners with Trend Micro to secure private 5G networks
Fujitsu and Trend Micro have collaborated to focus on the security of private 5G networks. The companies will demonstrate the effectiveness of Trend Micro’s security for …

Lack of IT-OT collaboration holding back smart factory security projects
61% of manufacturers have experienced cybersecurity incidents in their smart factories and are struggling to deploy the technology needed to effectively manage cyber risk, …

March 2021 Patch Tuesday: Microsoft fixes yet another actively exploited IE zero-day
As system administrators and security teams around the world are working on ascertaining whether they’ve been breached and compromised via vulnerable Microsoft Exchange …

Digital-first lifestyle opens consumers to potential risks during tax season
Consumers have faced a lot of change over the past year with the shift to a digital-first lifestyle, and tax season with increasing risks is no exception. McAfee’s 2021 …

Insights for navigating a drastically changing threat landscape
In a recent report, Trend Micro announced it detected 119,000 cyber threats per minute in 2020 as home workers and infrastructure came under new pressure from attacks. Attacks …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility