Newsroom

Research, News, and Perspective

Author: Morton Swimmer (Sr. Threat Researcher), Philippe Lin (Sr. Threat Researcher), Vincenzo Ciancaglini (Sr. Threat Researcher), Marco Balduzzi (Sr. Threat Researcher), Stephen Hilt (Sr. Threat Researcher)

The Road to Agentic AI: Exposed Foundations

Our research into Retrieval Augmented Generation (RAG) systems uncovered at least 80 unprotected servers. We highlight this problem, which can lead to potential data loss and unauthorized access.

Dec 04, 2024

Author: Sunil Bharti (Senior Threat Researcher)

Gafgyt Malware Broadens Its Scope in Recent Attacks

Our researchers identified threat actors exploiting misconfigured Docker servers to spread the Gafgyt malware. This threat traditionally targets IoT devices; this new tactic signals a change in its behavior.

Dec 03, 2024

World Tour Survey: IT Operations’ Hands-on Defense

Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what IT operations teams had to say.

Dec 02, 2024

DevOps Resource Center

Author: Michael Langford (Product Marketing)

AWS Graviton Use Cases

Discover how AWS Graviton’s optimized processors help provide a superior price-performance ratio. Available for AWS-managed services, you’ll gain insight on strategies, use cases, and insight on how to get the most out of AWS Graviton.

Sep 28, 2023

How to Protect Your CI/CD Pipeline

Continuous integration and continuous delivery/deployment (CI/CD) has won over app developers, with enterprise cybersecurity teams on the hook to protect CI/CD pipelines. OWASP’s Top 10 CI/CD Security Risks clarify what to watch for.

Aug 29, 2023

Author: Mike Milner (Director of Cloud Native Technology)

What Can Generative AI do for Hybrid Cloud Security?

As enterprise security operations centers absorb cloud security functions, they face new challenges and require new skills. Generative AI can help by laying a secure cloud foundation and empowering SOC teams to respond effectively when threats arise.

Aug 23, 2023

CISO Resource Center

Author: Lewis Duke (Trend Micro)

Inside Pwn2Own Ireland 2024: The Future of Hacking Enterprise Systems, Servers, and IoT

Following several exciting years in Toronto, the Pwn2Own event is making its way to Trend Micro’s offices in Cork, Ireland, from October 22-25, 2024. The event promises to showcase some of the most advanced and cutting-edge cyberattacks. Each year, security researchers from across the globe gather to exploit vulnerabilities in popular software and devices, pushing the boundaries of cybersecurity. The upcoming event will focus on several key categories of hacks, each targeting a variety of platforms, including enterprise software, industrial control systems, and servers.

Sep 30, 2024

Author: Dustin Childs (Trend Micro)

Pwn2Own Ireland 2024: A New Home, New Challenges, and Cutting-Edge Exploits

Pwn2Own, one of the most anticipated cybersecurity competitions, is back—and this time, it's moving to a new home. After several exciting years in Toronto, the contest is making its way to Trend Micro’s offices in Cork, Ireland, from October 22-25, 2024. The global tradition of Pwn2Own has seen it move from cities like Amsterdam, Tokyo, and Austin, and now, we're excited to bring the action to Cork.

Sep 26, 2024

Media Contacts

Pick your region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
USA
1 (817) 522-7911
Lisiane Lenz
AMEA
(971) 505785061
Funda Cizgenakad
Europe
+44 7876 616246
Lorena Rodriguez
Latin America
+52 55 3067-6000
Kaori Iizumi
Japan
+81-3-5334-3658
Angela Chiang
Taiwan
+ 886 2376 1222

Discover Trend Micro

The history, people, and values behind the company.

Connect with us