Research, News, and Perspective

Author: Sarah Pearl Camiling (Threat Hunter), Paul John Bardon (Threat Hunter)

New Info Stealer Bandit Stealer Targets Browsers, Wallets

This is an analysis of Bandit Stealer, a new Go-based information-stealing malware capable of evading detection as it targets multiple browsers and cryptocurrency wallets.

May 26, 2023

Author: Kazuhisa Tagaya (Security Expert)

Health Industry Cybersecurity Best Practices 2023

This blog explains the new resources of health industry cybersecurity practices and landscape analysis which the HHS (U.S. Department of Health and Human Services) released in Apr 2023.

May 25, 2023

Author: Joey Costoya (Senior Researcher)

Abusing Web Services Using Automated CAPTCHA-Breaking Services and Residential Proxies

This blog entry features three case studies that show how malicious actors evade the antispam, antibot, and antiabuse measures of online web services via residential proxies and CAPTCHA-breaking services.

May 25, 2023

DevOps Resource Center

Understanding XPath Injection Vulnerabilities

The ability to trigger XPath queries with user-supplied information introduces the risk of XPath injection attacks. Read on to explore how these attacks work and discover how to keep your XPath queries secure.

May 25, 2023

Author: Michael Langford (Product Marketing)

Azure vs. AWS Developer Tools Guide

Azure vs. AWS — which should you use for your DevOps environment? Discover the differences, similarities, and use cases to make an informed decision.

May 19, 2023

Security Vulnerabilities of ChatGPT-Generated Code

Discover the cybersecurity risks of AI-generated code, learn how to protect your applications, and understand how the rise of ChatGPT is impacting software development.

May 17, 2023

CISO Resource Center

Author: William Malik (VP, Infrastructure Strategies, Trend Micro)

Moore's Law, Latent Demand, and the Slowing of Cloud Computing

A growing chorus of organizations are slowing their cloud computing and migration. William Malik, Trend Micro’s VP of Infrastructure Strategies, discusses why this is happening, and what it will mean for organizations’ long-term plans.

May 25, 2023

Author: Chris LaFleur (Manager Threat IR and Forensics)

Against the Clock: Cyber Incident Response Plan

Conventional wisdom says most organizations will experience a cybersecurity breach at some point—if they haven’t already. That makes having a ready-to-launch incident response process crucial when an attack is detected, as this fictionalized scenario shows.

May 24, 2023

Author: Mike Milner (Head of Product Management, Cloud One)

Accelerating Security Risk Management

In response to the expanding attack surface, Mike Milner, Trend Micro VP of Cloud Technology, explores the role security risk management plays in this new era of cybersecurity and how IT leaders are accelerating innovation.

May 18, 2023

Media Contacts

Pick your region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
USA
1 (817) 522-7911
Priyanka Wani
AMEA
+(22) 2650-9927
Funda Cizgenakad
Europe
+44 7876 616246
Lorena Rodriguez
Latin America
+52 55 3067-6000
Kaori Iizumi
Japan
+81-3-5334-3658
Angela Chiang
Taiwan
+ 886 2376 1222

Discover Trend Micro

The history, people, and values behind the company.

  Media Coverage

Stay up-to-date
Get our news RSS.

Connect with us