Trend Micro
Trend Micro Cloud One: Security services platform for orgs building apps in the cloud
Trend Micro, the global leader in cloud security, announced the launch of Trend Micro Cloud One, a security services platform for organizations building applications in the …
Trend Micro enhances protection for industrial orgs
Trend Micro, a global leader in cybersecurity solutions, announced its complete smart factory security solutions, designed to provide enhanced visibility and protection for …

As the eSports industry grows, it becomes attractive for financially motivated cybercriminals
Though cybercriminals have been targeting the gaming community since 2010, eSports players, gaming companies, sponsors and viewers will be more at risk over the coming years …
Trend Micro announces Pwn2Own Miami, a new vulnerability research competition
Trend Micro, a global leader in cybersecurity solutions, announced a new vulnerability research competition, Pwn2Own Miami, run by Trend Micro’s Zero Day Initiative (ZDI). The …

PHP RCE flaw actively exploited to pop NGINX servers
A recently patched vulnerability (CVE-2019-11043) in PHP is being actively exploited by attackers to compromise NGINX web servers, threat intelligence firm Bad Packets has …
Trend Micro addresses cloud security fundamentals with the acquisition of Cloud Conformity
Trend Micro, the global leader in cloud security, announced it has acquired Cloud Conformity, an innovative Cloud Security Posture Management (CSPM) company. The acquisition …
Trend Micro and Snyk provide open source vulnerability intelligence for DevOps
Trend Micro, the global leader in cloud security, announced a strategic partnership with Snyk, the leader in developer-first open source security. The partnership will focus …

October 2019 Patch Tuesday: A small batch of updates from Microsoft, none from Adobe
As predicted by Ivanti’s Chris Goettl, October 2019 Patch Tuesday came with a relatively small number of Microsoft updates and, curiously enough, with no security …

Organizations need tools that support DevOps security
Organizational silos create unnecessary security risk for global businesses. The lack of security involvement in DevOps projects was reportedly creating cyber risk for 72% of …

IoT attacks increasing in the cyber underground
Cybercriminals from around the world are actively discussing how to compromise connected devices, and how to leverage these devices for moneymaking schemes, according to Trend …
Enhanced Trend Micro Security protects inboxes from scams and phishing attacks
Trend Micro, a global leader in cybersecurity solutions, launched the latest version of its flagship consumer offering, Trend Micro Security, which features enhanced …

Fileless attacks designed to disguise malicious activity up 265%
Trend Micro published its roundup report for the first half of 2019, revealing a surge in fileless attacks designed to disguise malicious activity. Detections of this threat …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility