Trend Micro and Snyk Significantly
Expand Partnership with Technology
Collaboration to Solve Open Source
Development Risks

Co-developed solution bridges the gap between DevOps and security
operations teams

Windows® Mac® AndroidTM iOS new Power Up

Trend Micro Named a Global
Cybersecurity Channel “Champion” by

Global Cybersecurity Leadership Matrix recognizes Trend Micro’s commitment to the channel

Windows® Mac® AndroidTM iOS new Power Up

Research, News, and Perspective

Author: Nathaniel Morales (Threat Analyst), Earle Maui Earnshaw (Threats Analyst), Don Ovid Ladores (Threats Analyst), Nick Dai (Sr. Threat Researcher), Nathaniel Gregory Ragasa (Threat Analyst)

New Mimic Ransomware Abuses Everything APIs for its Encryption Process

Trend Micro researchers discovered a new ransomware that abuses the APIs of a legitimate tool called Everything, a Windows filename search engine developed by Voidtools that offers quick searching and real-time updates for minimal resource usage.

Jan 26, 2023

Author: David Fiser (Threat Researcher)

Attacking The Supply Chain: Developer

In this proof of concept, we look into one of several attack vectors that can be abused to attack the supply chain: targeting the developer. With a focus on the local integrated developer environment (IDE), this proof considers the execution of malicious build scripts via injecting commands when the project or build is incorrectly “trusted”.

Jan 25, 2023

Author: Ieriz Nicolle Gonzalez (Threat Analyst), Paul Pajares (Threats Analyst), Arianne Dela Cruz (Threats Analyst), Warren Sto.Tomas (Sr. Threat Research Engineer)

Vice Society Ransomware Group Targets Manufacturing Companies

In this blog entry, we’d like to highlight our findings on Vice Society, which includes an end-to-end infection diagram that we were able to create using Trend Micro internal telemetry.

Jan 24, 2023

DevOps Resource Center

Dependency Mapping for DevSecOps

Discover the importance of dependency mapping and best practices for successful dependency management

Jan 25, 2023

TLS Connection Cryptographic Protocol Vulnerabilities

TLS is the backbone of encryption and key to ensuring data integrity, but its misconfiguration can leave your system vulnerable. Read on to discover how to secure your TLS connection and arm your organization against malicious attacks.

Jan 20, 2023

Author: Michael Langford (Product Marketing)

An in-depth HTTP Strict Transport Security Tutorial

HSTS is an Internet standard and policy that tells the browser to only interact with a website using a secure HTTPS connection. Check out this article to learn how to leverage the security of your website and customers’ data and the security benefits you’ll gain from doing so.

Jan 11, 2023

CISO Resource Center

Cyber Security Managed Services 101

MSP partnerships are growing in line with rapid cloud migration and the evolving threat landscape. Discover how an MSP can help your business and tips for making an informed partner decision.

Jan 31, 2023

Cybersecurity Posture & Insurance Outlook with Advisen

Trend Micro’s Eric Skinner, and Advisen, an insurance data and analytics company, discuss the current threat landscape, cyber risk management, and how vendors and cyber insurers can champion enhanced cybersecurity posture.

Jan 26, 2023

Author: Jon Clay (VP, Threat Intelligence)

Ransomware Recovery Plan for 2023

It’s important to defend against ransomware attacks, but is your organization prepared to deal with the consequences of a breach? Find out how to plan an effective ransomware recovery strategy.

Jan 24, 2023

Media Contacts

Pick your region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
1 (817) 522-7911
Lisiane Lenz
(971) 505785061
Funda Cizgenakad
+44 7876 616246
Lorena Rodriguez
Latin America
+52 55 3067-6000
Kaori Iizumi
Angela Chiang
+ 886 2376 1222

Discover Trend Micro

The history, people, and values behind the company.

  Media Coverage

Stay up-to-date
Get our news RSS.

Connect with us