Newsroom

Research, News, and Perspective

Author: Lenart Bermejo (Threats Analyst), Sunny Lu (Threats Analyst), Ted Lee (Threat Researcher)

Earth Preta Evolves its Attacks with New Malware and Strategies

In this blog entry, we discuss our analysis of Earth Preta’s enhancements in their attacks by introducing new tools, malware variants and strategies to their worm-based attacks and their time-sensitive spear-phishing campaign.

Sep 09, 2024

Author: Pierre Lee (Sr. Threat Researcher), Vickie Su (Threats Analyst)

TIDRONE Targets Military and Satellite Industries in Taiwan

Our research reveals that an unidentified threat cluster we named TIDRONE have shown significant interest in military-related industry chains, particularly in the manufacturers of drones.

Sep 06, 2024

Author: Mhica Romero (Threats Analyst), Joshua Aquino (Threats Analyst), Janus Agcaoili (Threats Analyst), Christian Jason Geollegue (Threat Response Engineer), Allen Benedict Magpoc (Sr. Threat Response Engineer), Mark Jason Co (Sr. Threat Solution Engineer), Kim Benedict Victorio (Cybersecurity Engineer), Adriel Isidro (Sr. Engineer - Threat Research), Raymond Joseph Alfonso (Sr. Threat Response Engineer)

Banking Trojans: Mekotio Looks to Expand Targets, BBTok Abuses Utility Command

Notorious Mekotio and BBTok are having a resurgence targeting Latin American users. Mekotio’s latest variant suggests the gang behind it is broadening their target, while BBTok is seen abusing MSBuild.exe to evade detection.

Sep 05, 2024

DevOps Resource Center

Author: Michael Langford (Product Marketing)

Zero Day Threat Protection for Your Network

Explore the world of zero day threats and gain valuable insight into the importance of proactive detection and remediation.

Oct 31, 2023

Author: Michael Langford (Product Marketing)

AWS Graviton Use Cases

Discover how AWS Graviton’s optimized processors help provide a superior price-performance ratio. Available for AWS-managed services, you’ll gain insight on strategies, use cases, and insight on how to get the most out of AWS Graviton.

Sep 28, 2023

How to Protect Your CI/CD Pipeline

Continuous integration and continuous delivery/deployment (CI/CD) has won over app developers, with enterprise cybersecurity teams on the hook to protect CI/CD pipelines. OWASP’s Top 10 CI/CD Security Risks clarify what to watch for.

Aug 29, 2023

CISO Resource Center

Author: Jonathan Lee (Trend Micro)

Translating cyber to business risk at Together Housing

Housing associations may not strike you as a typical target for cyber-criminals. But the wealth of personal and financial information they hold on tenants puts them firmly in the crosshairs of malicious actors.

Jun 25, 2024

Worldwide 2023 Email Phishing Statistics and Examples

Explore the need for going beyond built-in Microsoft 365 and Google Workspace™ security based on email threats detected in 2023.

Jun 20, 2024

Author: Jonathan Lee (Trend Micro)

Synnovis Cyberattack Highlights Vulnerability of NHS Supply Chains

On Monday, June 3rd, Synnovis—a partnership between two London-based hospital trusts and SYNLAB—fell victim to a ransomware cyberattack. This incident severely disrupted all Synnovis IT systems, causing interruptions to its pathology services. Such supply chain attacks, while increasingly common, pose risks to patient care and safety within the NHS.

Jun 18, 2024

Media Contacts

Pick your region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
USA
1 (817) 522-7911
Lisiane Lenz
AMEA
(971) 505785061
Funda Cizgenakad
Europe
+44 7876 616246
Lorena Rodriguez
Latin America
+52 55 3067-6000
Kaori Iizumi
Japan
+81-3-5334-3658
Angela Chiang
Taiwan
+ 886 2376 1222

Discover Trend Micro

The history, people, and values behind the company.

Connect with us