Trend Micro
Trend Micro cooperates with Japan International Cooperation Agency to secure the connected world
Trend Micro, a global leader in cybersecurity solutions, announced new initiatives designed to enhance collaboration with global law enforcement and developing nations through …

Attackers probing for vulnerable Microsoft Exchange Servers, is yours one of them?
CVE-2020-0688, a remote code execution bug in Microsoft Exchange Server that has been squashed by Microsoft in early February, is ripe for exploitation and could become a …
Trend Micro delivers strongest quarter in the company’s history
Trend Micro, a global leader in cybersecurity solutions, announced earnings results for the fourth quarter as well as its annual results of fiscal year 2019, ending December …

Emotet: Crimeware you need to be aware of
According to the U.S. Department of Homeland Security, Emotet continues to be among the most costly and destructive malware threats affecting state, local, and territorial …

February 2020 Patch Tuesday: Microsoft fixes 99 vulnerabilities, Adobe 42
February 2020 Patch Tuesday is here. To mark the occasion, Microsoft has released fixes for 99 vulnerabilities – 12 critical, one of which is being exploited in the wild …
Trend Micro and Baker Hughes collaborate to help deliver protection for critical infrastructure
Trend Micro, a global leader in cybersecurity solutions, announced that it will collaborate with Baker Hughes’ Nexus Controls operational technology (OT) security experts …

Researchers create OT honeypot, attract exploits and fraud
Trend Micro announced the results of research featuring a honeypot imitating an industrial factory. The highly sophisticated Operational Technology (OT) honeypot attracted …

January 2020 Patch Tuesday: Microsoft nukes Windows crypto flaw flagged by the NSA
As forecasted, January 2020 Patch Tuesday releases by Microsoft and Adobe are pretty light: the “star of the show” is CVE-2020-0601, a Windows flaw flagged by the …

Oil and gas industry risks escalate, cybersecurity should be prioritized
The oil and gas industry and its supply chain face increased cybersecurity risks from advanced threat groups and others as they continue to build out digitally connected …

December 2019 Patch Tuesday: Microsoft fixes one actively exploited zero-day
For December 2019 Patch Tuesday, Microsoft and Adobe have released the final scheduled security updates for this year, Intel has fixed Plundervolt, and Google has delivered …

New infosec products of the week: November 22, 2019
CyberSaint Governance Dashboard empowers CISOs to communicate compliance and risk posture in real-time CyberSaint Security announced significant updates to its Governance …

Cyber risk increases at all layers of the corporate network
Organizations will face a growing risk from their cloud and the supply chain, according to Trend Micro. Cyber risk increases at all levels The growing popularity of cloud and …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility