Trend Micro and Snyk Significantly
Expand Partnership with Technology
Collaboration to Solve Open Source
Development Risks

Co-developed solution bridges the gap between DevOps and security
operations teams

Windows® Mac® AndroidTM iOS new Power Up

Trend Micro Named a Global
Cybersecurity Channel “Champion” by

Global Cybersecurity Leadership Matrix recognises Trend Micro’s commitment to the channel

Windows® Mac® AndroidTM iOS new Power Up

Research, News, Perspective

TgToxic Malware’s Automated Framework Targets Southeast Asia Android Users

We look into an ongoing malware campaign we named TgToxic, targeting Android mobile users in Taiwan, Thailand, and Indonesia since July 2022. The malware steals users’ credentials and assets such as cryptocurrency from digital wallets, as well as money from bank and finance apps. Analyzing the automated features of the malware, we found that the threat actor abused legitimate test framework Easyclick to write a Javascript-based automation script for functions such as clicks and gestures.

Feb 03, 2023

Author: Mohamed Fahmy (Threat Intelligence Analyst), Sherif Magdy (Threat Intelligence Analyst), Mahmoud Zohdy (Threat Intelligence Analyst)

New APT34 Malware Targets The Middle East

We analyse an infection campaign targeting organisations in the Middle East for cyberespionage in December 2022 using a new backdoor malware. The campaign abuses legitimate but compromised email accounts to send stolen data to external mail accounts controlled by the attackers.

Feb 02, 2023

Author: Stephen Hilt (Sr. Threat Researcher), Lord Alfred Remorin (Sr. Threat Researcher)

What SOCs Need to Know About Water Dybbuk, A BEC Actor Using Open-Source Toolkits

We analyse a BEC campaign targeting large companies around the world that was leveraging open-source tools to stay under the radar.

Feb 02, 2023

DevOps Resource Centre

Attack Vector vs Attack Surface: The Subtle Difference

To establish a better security posture, you must address vulnerabilities in your attack vectors and surfaces. While these terms are similar, they’re not the same. This article explores key differences between the two, helping you make your system more secure.

Feb 01, 2023

Dependency Mapping for DevSecOps

Discover the importance of dependency mapping and best practices for successful dependency management

Jan 25, 2023

TLS Connection Cryptographic Protocol Vulnerabilities

TLS is the backbone of encryption and key to ensuring data integrity, but its misconfiguration can leave your system vulnerable. Read on to discover how to secure your TLS connection and arm your organization against malicious attacks.

Jan 20, 2023

CISO Resource Centre

6 Ransomware Trends & Evolutions For 2023

In the era of digital transformation, ransomware groups are adapting to changing technology. The next evolution of ransomware could begin with these trends.

Feb 02, 2023

Cyber Security Managed Services 101

MSP partnerships are growing in line with rapid cloud migration and the evolving threat landscape. Discover how an MSP can help your business and tips for making an informed partner decision.

Jan 31, 2023

Cybersecurity Posture & Insurance Outlook with Advisen

Trend Micro’s Eric Skinner, and Advisen, an insurance data and analytics company, discuss the current threat landscape, cyber risk management, and how vendors and cyber insurers can champion enhanced cybersecurity posture.

Jan 26, 2023

Media Contacts

Pick your region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
1 (817) 522-7911
Lisiane Lenz
(971) 505785061
Funda Cizgenakad
+44 7876 616246
Lorena Rodriguez
Latin America
+52 55 3067-6000
Kaori Iizumi
Angela Chiang
+ 886 2376 1222

Discover Trend Micro

The history, people, and values behind the company.

  Media Coverage

Stay up-to-date
Get our news RSS.

Connect with us