Cyberbedrohungen auf Rekord-Niveau
2023 blockierte Trend Micro über 161 Milliarden Cyberbedrohungen weltweit – 10 Prozent mehr als im Vorjahr
und fast 107 Milliarden mehr als noch vor fünf Jahren

Windows® Mac® AndroidTM iOS new Power Up

Strafverfolgungsbehörden greifen bei der Disruption von LockBit auf Trend Micro-Expertise zurück
Trend Micro vereitelte und analysierte die neueste noch unveröffentlichte Ransomware-Version von LockBit

Windows® Mac® AndroidTM iOS new Power Up

Sicherheitsvorhersagen für 2024: KI-unterstützte Cyberangriffe auf dem Vormarsch
Trend Micro prognostiziert neue Welle an Social Engineering und Identitätsdiebstahl und ruft Technologiebranche
zu Selbstregulierung auf

Windows® Mac® AndroidTM iOS new Power Up

Research, Neuigkeiten und Perspektiven

Autor: Stephen Hilt (Sr. Threat Researcher), Aliakbar Zahravi (Staff Researcher)

Missbrauch von Red Teaming-Tools

Red Teaming-Tools, die Unternehmen bei der Simulation von Cyberangriffen und bei Sicherheitsbewertungen einsetzen, sollen die Abwehrkräfte eines Unternehmens stärken. Doch können sie leider auch für cyberkriminelle Aktivitäten missbraucht werden.

Oct 22, 2024

Autor: Abdelrahman Esmail (Sr. Engineer), Sunil Bharti (Senior Threat Researcher)

Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach

In this blog entry, we discuss how malicious actors are exploiting Docker remote API servers via gRPC/h2c to deploy the cryptominer SRBMiner to facilitate their mining of XRP on Docker hosts.

Oct 22, 2024

Autor: Sunil Bharti (Senior Threat Researcher), Ranga Duraisamy (Vulnerability Researcher)

Attackers Target Exposed Docker Remote API Servers With perfctl Malware

We observed an unknown threat actor abusing exposed Docker remote API servers to deploy the perfctl malware.

Oct 21, 2024

DevOps Resource Center

How to Protect Your CI/CD Pipeline

Continuous integration and continuous delivery/deployment (CI/CD) has won over app developers, with enterprise cybersecurity teams on the hook to protect CI/CD pipelines. OWASP’s Top 10 CI/CD Security Risks clarify what to watch for.

Aug 29, 2023

Autor: Mike Milner (Director of Cloud Native Technology)

What Can Generative AI do for Hybrid Cloud Security?

As enterprise security operations centers absorb cloud security functions, they face new challenges and require new skills. Generative AI can help by laying a secure cloud foundation and empowering SOC teams to respond effectively when threats arise.

Aug 23, 2023

How to Build a Simple Application Powered by ChatGPT

OpenAI’s ChatGPT API enables applications to access and integrate ChatGPT, a large language model (LLM) that generates human-like responses to input. Learn how to build a web application that utilizes ChatGPT to generate useful output.

Aug 15, 2023

CISO Resource Center

Guide to Better Extended Threat Detection and Response (XDR)

Discover how XDR can enhance threat detection and response to improve a SecOps team’s efficiency and outcomes.

Jun 03, 2024

Autor: David Chow (Chief Technology Strategy Officer)

A Necessary Digital Odyssey of RPA and AI/ML at HUD

Explore two RPA and AI/ML use cases at HUD during the operational challenges of the longest US Government shutdown, a rigid legacy IT environment, and complex federal regulations.

Mar 13, 2024

Managing Cyber Risk for Under-Pressure CISOs

Overworked CISOs are struggling to deliver the cybersecurity results their organizations expect. Fortunately, there are concrete and practical ways they can make their lives easier—while managing cyber risk effectively.

Feb 28, 2024

Medienkontakte

Wählen Sie Ihre Region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
USA
1 (817) 522-7911
Lisiane Lenz
AMEA
(971) 505785061
Tobias Grabitz
Europe
+49 (0) 170 144 23 68
Lorena Rodriguez
Latin America
+52 55 3067-6000
Kaori Iizumi
Japan
+81-3-5334-3658
Angela Chiang
Taiwan
+ 886 2376 1222

Entdecken Sie Trend Micro

Die Geschichte, das Team und die Werte des Unternehmens

Kontakt aufnehmen