Research, News, and Perspective

Author: Nathaniel Morales (Threat Analyst), Earle Maui Earnshaw (Threats Analyst), Don Ovid Ladores (Threats Analyst), Nick Dai (Sr. Threat Researcher), Nathaniel Gregory Ragasa (Threat Analyst)

New Mimic Ransomware Abuses Everything APIs for its Encryption Process

Trend Micro researchers discovered a new ransomware that abuses the APIs of a legitimate tool called Everything, a Windows filename search engine developed by Voidtools that offers quick searching and real-time updates for minimal resource usage.

Jan 26, 2023

Author: David Fiser (Threat Researcher)

Attacking The Supply Chain: Developer

In this proof of concept, we look into one of several attack vectors that can be abused to attack the supply chain: targeting the developer. With a focus on the local integrated developer environment (IDE), this proof considers the execution of malicious build scripts via injecting commands when the project or build is incorrectly “trusted”.

Jan 25, 2023

Author: Ieriz Nicolle Gonzalez (Threat Analyst), Paul Pajares (Threats Analyst), Arianne Dela Cruz (Threats Analyst), Warren Sto.Tomas (Sr. Threat Research Engineer)

Vice Society Ransomware Group Targets Manufacturing Companies

In this blog entry, we’d like to highlight our findings on Vice Society, which includes an end-to-end infection diagram that we were able to create using Trend Micro internal telemetry.

Jan 24, 2023

DevOps Resource Center

CISO Resource Center

Cybersecurity Posture & Insurance Outlook with Advisen

Trend Micro’s Eric Skinner, and Advisen, an insurance data and analytics company, discuss the current threat landscape, cyber risk management, and how vendors and cyber insurers can champion enhanced cybersecurity posture.

Jan 26, 2023

Author: Jon Clay (VP, Threat Intelligence)

Ransomware Recovery Plan for 2023

It’s important to defend against ransomware attacks, but is your organization prepared to deal with the consequences of a breach? Find out how to plan an effective ransomware recovery strategy.

Jan 24, 2023

Author: Greg Young (VP of Cybersecurity, Trend Micro)

What is Business Attack Surface Management?

Explore how businesses can make internal and external attack surface management (ASM) actionable.

Jan 19, 2023

Media Contacts

Pick your region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
USA
1 (817) 522-7911
Lisiane Lenz
AMEA
(971) 505785061
Karianne Myrvold
Europe - Norway
+47 2212 8500
Lorena Rodriguez
Latin America
+52 55 3067-6000
Kaori Iizumi
Japan
+81-3-5334-3658
Angela Chiang
Taiwan
+ 886 2376 1222

Discover Trend Micro

The history, people, and values behind the company.

Connect with us