Trend Micro and Snyk Significantly
Expand Partnership with Technology
Collaboration to Solve Open Source
Development Risks

Co-developed solution bridges the gap between DevOps and security
operations teams

Windows® Mac® AndroidTM iOS new Power Up

Trend Micro Named a Global
Cybersecurity Channel “Champion” by

Global Cybersecurity Leadership Matrix recognizes Trend Micro’s commitment to the channel

Windows® Mac® AndroidTM iOS new Power Up

Research, News, and Perspective

Author: Sunil Bharti (Senior Threat Researcher)

Atlassian Confluence Vulnerability CVE-2022-26134 Abused For Cryptocurrency Mining, Other Malware

Users are advised to patch immediately: We found exploit samples abusing the Atlassian Confluence vulnerability (CVE-2022-26134) in the wild for malicious cryptocurrency mining.

Sep 21, 2022

Author: Ryan Flores (Sr. Manager, Threat Research), Charles Perine (Sr. Threat Researcher), Lord Alfred Remorin (Sr. Threat Researcher), Roel Reyes (Sr. Threat Researcher)

Security Risks in Logistics APIs Used by E-Commerce Platforms

Our research examines the security flaws that we found in the logistics API implementation of e-commerce platforms that can potentially expose the consumers’ personal information. We discuss the security risks that such flaws present for software engineers, e-commerce platform providers, and consumers.

Sep 20, 2022

The Risk of Ransomware Supply Chain Attacks

Over the years, ransomware has become a major threat and it can put supply chains in deep trouble.

Sep 20, 2022

DevOps Resource Center

Author: Duane Seon (Product Marketing)

Simplify with Network Security as a Service (NSaaS)

Learn more on how network security as a service (NSaaS) employs the latest technologies to counter unknown threats and detect abnormal behavior before it becomes a direct threat.

Sep 23, 2022

Author: Michael Langford (Product Marketing)

Top 5 CNAPP-Solved Security Challenges

Cloud-native application security solutions consist of various tools, each with its own objective - learn what security challenges CNAPP solves.

Sep 15, 2022

Author: Michael Langford (Product Marketing)


This article will explore three solutions, CIEM, CWPP, and CSPM, detail a sample case for each, and help you to determine when and how to use them—whether individually or in conjunction with one another.

Sep 08, 2022

CISO Resource Center

Author: Jon Clay (VP, Threat Intelligence), Ed Cabrera (Chief Cybersecurity Officer)

Preventing Cryptocurrency Cyber Extortion

Highly destructive cybercrime is on the rise, and most of it is being funded with anonymous cryptocurrency. Discover cryptocurrency trends and how enterprises can enhance their cybersecurity posture to prevent cyber extortion.

Sep 27, 2022

Author: Jon Clay (VP, Threat Intelligence)

How to Prevent Ransomware as a Service (RaaS) Attacks

Explore key insights on how ransomware as a service (RaaS) operators work and how to prevent ransomware attacks.

Sep 22, 2022

Author: Greg Young (VP of Cybersecurity, Trend Micro)

Cybersecurity Awareness Month 2022: 3 Actionable Tips

Make Cybersecurity Awareness Month a year-long initiative with these three actionable security tips to reduce cyber risk across the attack surface.

Sep 20, 2022

Media Contacts

Pick your region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
1 (817) 522-7911
Lisiane Lenz
(971) 505785061
Funda Cizgenakad
+44 7876 616246
Lorena Rodriguez
Latin America
+52 55 3067-6000
Kaori Iizumi
Angela Chiang
+ 886 2376 1222

Discover Trend Micro

The history, people, and values behind the company.

  Media Coverage

Stay up-to-date
Get our news RSS.

Connect with us