Research, News, and Perspective

Author: Peter Girnus (Sr. Threat Researcher), Aliakbar Zahravi (Staff Researcher)

Analyzing the FUD Malware Obfuscation Engine BatCloak

We look into BatCloak engine, its modular integration into modern malware, proliferation mechanisms, and interoperability implications as malicious actors take advantage of its fully undetectable (FUD) capabilities.

Jun 09, 2023

Author: Cedric Pernet (Sr. Threat Researcher), Joseph C Chen (Threat Researcher)

Impulse Team’s Massive Years-Long Mostly-Undetected Cryptocurrency Scam

We have been able to uncover a massive cryptocurrency scam involving more than a thousand websites handled by different affiliates linked to a program called Impulse Project, run by a threat actor named Impulse Team.

Jun 06, 2023

Author: Earle Maui Earnshaw (Threats Analyst), Nathaniel Morales (Threat Analyst), Katherine Casona (Threat Analyst), Don Ovid Ladores (Threats Analyst)

Xollam, the Latest Face of TargetCompany

This blog talks about the latest TargetCompany ransomware variant, Xollam, and the new initial access technique it uses. We also investigate previous variants' behaviors and the ransomware family's extortion scheme.

Jun 06, 2023

DevOps Resource Center

Guide to Serverless Architecture Design Patterns

Discover the power of serverless architecture design patterns for scalable and efficient application development. Explore EDA, pub-sub, fan-out/fan-in, strangler, and saga patterns. Learn how to select, implement, and optimize them for your needs.

Jun 08, 2023

Author: Sterling Davis (Technical Product Manager)

Event-Driven Architecture & the Security Implications

This article explores the benefits of event-driven architecture for developers and best practices for mitigating security concerns.

Jun 06, 2023

When is it time for a cyber hygiene audit?

Cyber hygiene is crucial for keeping your organization safe by limiting security breaches, threats against your IT infrastructure, and more. Read on to learn more about what makes up cyber hygiene, and how to audit its effectiveness.

May 30, 2023

CISO Resource Center

Essential Cybersecurity Compliance Standards

With the continued expansion of your attack surface, cybersecurity compliance has become more important than ever. Gain an overview of the most popular compliance standards, including HIPAA, NIST, ISO, and PCI DSS, to safeguard your business against potential risks.

Jun 08, 2023

What is Secure Web Gateway’s (SWG) Role in Zero Trust?

Explore why secure web gateway (SWG) is important to effectively secure cloud resources and reduce cyber risk across the attack surface and the role a zero trust strategy can play.

Jun 06, 2023

Author: Greg Young (VP of Cybersecurity, Trend Micro)

Generative AI: What Every CISO Needs to Know

New technologies always change the security landscape, but few are likely to have the transformative power of generative AI. As platforms like ChatGPT continue to catch on, CISOs need to understand the unprecedented cybersecurity risks they bring—and what to do about them.

Jun 01, 2023

Media Contacts

Pick your region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
USA
media_relations@trendmicro.com
Priyanka Wani
AMEA
Amea_PR@trendmicro.com
Funda Cizgenakad
Europe
funda_cizgenakad@trendmicro.co.uk
Lorena Rodriguez
Latin America
lorena_rodriguez@trendmicro.com
Kaori Iizumi
Japan
pressweb@trendmicro.co.jp
Angela Chiang
Taiwan
angela_chiang@trend.com.tw

Discover Trend Micro

The history, people, and values behind the company.

  Media Coverage

Stay up-to-date
Get our news RSS.

Connect with us