We look into BatCloak engine, its modular integration into modern malware, proliferation mechanisms, and interoperability implications as malicious actors take advantage of its fully undetectable (FUD) capabilities.
Jun 09, 2023
We have been able to uncover a massive cryptocurrency scam involving more than a thousand websites handled by different affiliates linked to a program called Impulse Project, run by a threat actor named Impulse Team.
Jun 06, 2023
This blog talks about the latest TargetCompany ransomware variant, Xollam, and the new initial access technique it uses. We also investigate previous variants' behaviors and the ransomware family's extortion scheme.
Jun 06, 2023
Discover the power of serverless architecture design patterns for scalable and efficient application development. Explore EDA, pub-sub, fan-out/fan-in, strangler, and saga patterns. Learn how to select, implement, and optimize them for your needs.
Jun 08, 2023
This article explores the benefits of event-driven architecture for developers and best practices for mitigating security concerns.
Jun 06, 2023
Cyber hygiene is crucial for keeping your organization safe by limiting security breaches, threats against your IT infrastructure, and more. Read on to learn more about what makes up cyber hygiene, and how to audit its effectiveness.
May 30, 2023
With the continued expansion of your attack surface, cybersecurity compliance has become more important than ever. Gain an overview of the most popular compliance standards, including HIPAA, NIST, ISO, and PCI DSS, to safeguard your business against potential risks.
Jun 08, 2023
Explore why secure web gateway (SWG) is important to effectively secure cloud resources and reduce cyber risk across the attack surface and the role a zero trust strategy can play.
Jun 06, 2023
New technologies always change the security landscape, but few are likely to have the transformative power of generative AI. As platforms like ChatGPT continue to catch on, CISOs need to understand the unprecedented cybersecurity risks they bring—and what to do about them.
Jun 01, 2023
Pick your region:
Discover Trend Micro
The history, people, and values behind the company.
Media Coverage
May 09, 2023
May 07, 2023
Stay up-to-date
Get our news RSS.
Connect with us