Research, News, and Perspective

Author: Srivathsa Sharma (Threats Researcher)

Examining the Activities of the Turla APT Group

We examine the campaigns of the cyberespionage group known as Turla over the years, with a special focus on the key MITRE techniques and the corresponding IDs associated with the threat actor group.

Sep 22, 2023

Author: Shannon Murphy (Risk and Threat Specialist)

Decoding Turla: Trend Micro's MITRE Performance

This year, the MITRE Engenuity ATT&CK evaluation tested cybersecurity vendors against simulated attack scenarios mimicking the adversary group “Turla.” Learn about Trend Micro's 100% successful protection performance.

Sep 21, 2023

Author: Cedric Pernet (Sr. Threat Researcher)

Cybercriminals Exploit the Moroccan Tragedy in New Scam Campaign

This blog entry details a scheme that exploits the recent Morocco earthquake by impersonating the domain name of a well-known humanitarian organization for financial fraud.

Sep 21, 2023

DevOps Resource Center

Author: Michael Langford (Product Marketing)

Azure vs. AWS Developer Tools Guide

Azure vs. AWS — which should you use for your DevOps environment? Discover the differences, similarities, and use cases to make an informed decision.

Sep 12, 2023

How to Protect Your CI/CD Pipeline

Continuous integration and continuous delivery/deployment (CI/CD) has won over app developers, with enterprise cybersecurity teams on the hook to protect CI/CD pipelines. OWASP’s Top 10 CI/CD Security Risks clarify what to watch for.

Aug 29, 2023

Author: Mike Milner (Director of Cloud Native Technology)

What Can Generative AI do for Hybrid Cloud Security?

As enterprise security operations centers absorb cloud security functions, they face new challenges and require new skills. Generative AI can help by laying a secure cloud foundation and empowering SOC teams to respond effectively when threats arise.

Aug 23, 2023

CISO Resource Center

Author: Alifiya Sadikali (Zero Trust Advocate)

Zero Trust Adoption: Tips to Win Over Leadership

Implementing Zero Trust can be difficult due to outdated systems, employee resistance, and cost. Yet, the benefits outweigh the challenges. It is key to use a platform that combines multiple security technologies to simplify IT and risk assessment, proper planning, and getting security buy-in from stakeholders, including your board of directors.

Sep 21, 2023

Author: William Malik (VP, Infrastructure Strategies, Trend Micro)

Protect CNC Machines in Networked IT/OT Environments

Networking IT/OT environments is a bit like walking a tightrope, balancing the pursuit of intelligence and efficiency against the risks of exposing OT systems to the wider world. Trend Micro recently teamed up with global machine tool company Celada to identify specific risks associated with industrial CNC machines—and how to mitigate them.

Sep 19, 2023

Author: Jon Clay (VP, Threat Intelligence)

Biden National Cybersecurity Strategy Key Takeaways

Major changes are underway, with new rules for federal agencies and updated requirements for public-private partnerships. We discuss the implementation plans for the strategy's first two pillars: defend critical infrastructure and disrupt and dismantle threat actors.

Sep 15, 2023

Media Contacts

Pick your region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
1 (817) 522-7911
Lisiane Lenz
(971) 505785061
Funda Cizgenakad
+44 7876 616246
Lorena Rodriguez
Latin America
+52 55 3067-6000
Kaori Iizumi
Angela Chiang
+ 886 2376 1222

Discover Trend Micro

The history, people, and values behind the company.

Connect with us