Trend Micro and Snyk Significantly
Expand Partnership with Technology
Collaboration to Solve Open Source
Development Risks

Co-developed solution bridges the gap between DevOps and security
operations teams

Windows® Mac® AndroidTM iOS new Power Up

Trend Micro Named a Global
Cybersecurity Channel “Champion” by

Global Cybersecurity Leadership Matrix recognizes Trend Micro’s commitment to the channel

Windows® Mac® AndroidTM iOS new Power Up

Company Blog

Author: Federico Maggi (Sr. Threat Researcher)

Security Risks for Audio-centric Social Media Apps

Use of audio-only social media apps has been steadily capturing the interest of more users but just like any other technology, apps like these are not immune from security risks.

Feb 24, 2021

Author: Janus Agcaoili (Threats Analyst), Byron Gelera (Threats Analyst)

An Analysis of the Nefilim Ransomware

Nefilim is known for its double extortion capabilities and notable attacks in 2020. We give an overview of its techniques and tools in this entry.

Feb 23, 2021

Author: Sébastien Dudek (Threat Researcher)

Gauging LoRaWAN Communication Security with LoraPWN

This second part of our series on LoRaWAN will discuss the security of LoRaWAN communication and possible attacks on vulnerabilities.

Feb 19, 2021

Media Contacts

Pick your region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
1 (817) 522-7911
Grace Yu
(817) 522-7911
Funda Cizgenakad
+44 7876 616246
Lorena Rodriguez
Latin America
+52 55 3067-6000
Kaori Iizumi
Angela Chiang
+ 886 2376 1222

Discover Trend Micro

The history, people, and values behind the company.

  Media Coverage

Stay up-to-date
Get our news RSS.

Connect with us