Skip to content

Threat Reports and Security Predictions

More Options

open all


Hazards ahead: Current vulnerabilities prelude impending attacks

Severe data breaches, the "shotgun approach," and security loopholes made up the threats in the third quarter of 2015. Read how threats have become more personal to victims and more lucrative to its perpetrators.

Find out more


The threat landscape in 2016: What to expect


2Q Security Roundup: Cybercriminals Target Public Technologies


Malicious ads and zero-day flaws: Reemerging threats challenge trust in supply chains and best practices


A year of destructive cyber attacks highlights the need for cyber-preparedness


TrendLabs 3Q 2014 Security Roundup: Vulnerabilities Under Attack


The Invisible Becomes Visible: Trend Micro Security Predictions for 2015 and Beyond


TrendLabs 2Q 2014 Security Roundup: Turning the Tables on Cyber Attacks


TrendLabs 1Q 2014 Security Roundup: Cybercrime Hits the Unexpected


Targeted Attack Trends: 2H 2013 Report


2014 CyberThreat Defense Report


TrendLabs Annual 2013 Security Roundup: Cashing in on Digital Information


Blurring Boundaries: Trend Micro Predictions for 2014 and Beyond


TrendLabs 3Q 2013 Security Roundup: The Invisible Web Unmasked


2Q Report on Targeted Attack Campaigns


TrendLabs 2Q 2013 Security Roundup: Mobile Threats Go Full Throttle: Device Flaws Lead to Risky Trail


TrendLabs 1Q 2013 Security Roundup: Zero-Days Hit Users Hard at the Start of the Year


TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World


TrendLabs 2012 Mobile Threat and Security Roundup: Repeating History


More in Threat Reports

Connect with us on