Trend Micro and Snyk Significantly
Expand Partnership with Technology
Collaboration to Solve Open Source
Development Risks

Co-developed solution bridges the gap between DevOps and security
operations teams

Windows® Mac® AndroidTM iOS new Power Up

Trend Micro Named a Global
Cybersecurity Channel “Champion” by
Canalys

Global Cybersecurity Leadership Matrix recognises Trend Micro’s commitment to the channel

Windows® Mac® AndroidTM iOS new Power Up

Research, News, and Perspective

Author: Mohamed Fahmy (Threat Researcher), Mahmoud Zohdy (Threat Researcher)

APT34 Deploys Phishing Attack With New Malware

We observed and tracked the advanced persistent threat (APT) APT34 group with a new malware variant accompanying a phishing attack comparatively similar to the SideTwist backdoor malware. Following the campaign, the group abused a fake licence registration form of an African government agency to target a victim in Saudi Arabia.

Sep 29, 2023

Author: Srivathsa Sharma (Threats Researcher)

Examining the Activities of the Turla APT Group

We examine the campaigns of the cyberespionage group known as Turla over the years, with a special focus on the key MITRE techniques and the corresponding IDs associated with the threat actor group.

Sep 22, 2023

Author: Shannon Murphy (Risk and Threat Specialist)

Decoding Turla: Trend Micro's MITRE Performance

This year, the MITRE Engenuity ATT&CK evaluation tested cybersecurity vendors against simulated attack scenarios mimicking the adversary group “Turla.” Learn about Trend Micro's 100% successful protection performance.

Sep 21, 2023

DevOps Resource Centre

Author: Michael Langford (Product Marketing)

AWS Graviton Use Cases

Discover how AWS Graviton’s optimized processors help provide a superior price-performance ratio. Available for AWS-managed services, you’ll gain insight on strategies, use cases, and insight on how to get the most out of AWS Graviton.

Sep 28, 2023

Author: Michael Langford (Product Marketing)

Azure vs. AWS Developer Tools Guide

Azure vs. AWS — which should you use for your DevOps environment? Discover the differences, similarities, and use cases to make an informed decision.

Sep 12, 2023

How to Protect Your CI/CD Pipeline

Continuous integration and continuous delivery/deployment (CI/CD) has won over app developers, with enterprise cybersecurity teams on the hook to protect CI/CD pipelines. OWASP’s Top 10 CI/CD Security Risks clarify what to watch for.

Aug 29, 2023

CISO Resource Centre

Media Contacts

Pick your region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
USA
media_relations@trendmicro.com
Priyanka Wani
AMEA
Amea_PR@trendmicro.com
Funda Cizgenakad
Europe
funda_cizgenakad@trendmicro.co.uk
Lorena Rodriguez
Latin America
lorena_rodriguez@trendmicro.com
Kaori Iizumi
Japan
pressweb@trendmicro.co.jp
Angela Chiang
Taiwan
angela_chiang@trend.com.tw

Discover Trend Micro

The history, people, and values behind the company.

  Media Coverage

Stay up-to-date
Get our news RSS.

Connect with us