Trend Micro and Snyk Significantly
Expand Partnership with Technology
Collaboration to Solve Open Source
Development Risks

Co-developed solution bridges the gap between DevOps and security
operations teams

Windows® Mac® AndroidTM iOS new Power Up

Trend Micro Named a Global
Cybersecurity Channel “Champion” by

Global Cybersecurity Leadership Matrix recognizes Trend Micro’s commitment to the channel

Windows® Mac® AndroidTM iOS new Power Up

Research, News, and Perspective

Author: Sunil Bharti (Senior Threat Researcher)

Atlassian Confluence Vulnerability CVE-2022-26134 Abused For Cryptocurrency Mining, Other Malware

Users are advised to patch immediately: We found exploit samples abusing the Atlassian Confluence vulnerability (CVE-2022-26134) in the wild for malicious cryptocurrency mining.

Sep 21, 2022

Author: Ryan Flores (Sr. Manager, Threat Research), Charles Perine (Sr. Threat Researcher), Lord Alfred Remorin (Sr. Threat Researcher), Roel Reyes (Sr. Threat Researcher)

Security Risks in Logistics APIs Used by E-Commerce Platforms

Our research examines the security flaws that we found in the logistics API implementation of e-commerce platforms that can potentially expose the consumers’ personal information. We discuss the security risks that such flaws present for software engineers, e-commerce platform providers, and consumers.

Sep 20, 2022

The Risk of Ransomware Supply Chain Attacks

Over the years, ransomware has become a major threat and it can put supply chains in deep trouble.

Sep 20, 2022

DevOps Resource Center

Author: Duane Seon (Product Marketing)

Simplify with Network Security as a Service (NSaaS)

Learn more on how network security as a service (NSaaS) employs the latest technologies to counter unknown threats and detect abnormal behavior before it becomes a direct threat.

Sep 23, 2022

Author: Michael Langford (Product Marketing)

Top 5 CNAPP-Solved Security Challenges

Cloud-native application security solutions consist of various tools, each with its own objective - learn what security challenges CNAPP solves.

Sep 15, 2022

Author: Michael Langford (Product Marketing)


This article will explore three solutions, CIEM, CWPP, and CSPM, detail a sample case for each, and help you to determine when and how to use them—whether individually or in conjunction with one another.

Sep 08, 2022

CISO Resource Center

Author: Jon Clay (VP, Threat Intelligence)

How to Prevent Ransomware as a Service (RaaS) Attacks

Explore key insights on how ransomware as a service (RaaS) operators work and how to prevent ransomware attacks.

Sep 22, 2022

Author: Greg Young (VP of Cybersecurity, Trend Micro)

Cybersecurity Awareness Month 2022: 3 Actionable Tips

Make Cybersecurity Awareness Month a year-long initiative with these three actionable security tips to reduce cyber risk across the attack surface.

Sep 20, 2022

Author: Lucas van den Berg (Manager European Red Team and Incident Response Coordinator)

Red Teaming to Reduce Cyber Risk

Discover how red teaming can help reduce cyber risk across your ever-expanding digital attack surface.

Sep 15, 2022

Media Contacts

Pick your region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
1 (817) 522-7911
Lisiane Lenz
(971) 505785061
Funda Cizgenakad
+44 7876 616246
Lorena Rodriguez
Latin America
+52 55 3067-6000
Kaori Iizumi
Angela Chiang
+ 886 2376 1222

Discover Trend Micro

The history, people, and values behind the company.

Connect with us