Content added to Folio

Research, News, and Perspectives

Add Filters
Filter by:
Ctrl+Alt+Truth. Welcome to the future of cybercrime
Cyber Threats

Ctrl+Alt+Truth. Welcome to the future of cybercrime

Welcome to 2030, to the nation of New San Joban, where a single keystroke can alter reality. Discover what a fully converged digital world means for the future of cybersecurity, and how you can stay ahead of the bad guys.

November 04, 2021
Cyber Threats

Trend Micro Cloud One Network Security-as-a-Service

Trend Micro, alongside Amazon Web Services, provides the latest in cloud-native deployment options. We have simplified network security, protecting customers across Virtual Private Clouds (VPCs) without needing agents to be installed on instances.

Latest News Nov 29, 2021

Save to Folio

Latest News Nov 29, 2021

Save to Folio

Cyber Threats

AWS re:Invent 2021 Guide: Checklist & Key Sessions

Welcome to your complete guide to AWS re:Invent 2021, where you will find tips on how to get the most out of your conference experience both in Las Vegas and virtually.

Expert Perspective Nov 29, 2021

Save to Folio

Expert Perspective Nov 29, 2021

Save to Folio

Compliance & Risks

COP26 Backs Electric Vehicles to Reduce Climate Change

The 26 United Nations Climate Change Conference pushes for countries of parties to adopt more widespread EV use in order to reduce the looming threats of climate change.

Latest News Nov 23, 2021

Save to Folio

Latest News Nov 23, 2021

Save to Folio

This Week in Security News - November 19, 2021

This week, learn about how the QAKBOT Loader malware has evolved its techniques and strategies over time. Also, read about the most recent initiative by the legislation to further cybersecurity protection.

Expert Perspective Nov 19, 2021

Save to Folio

Expert Perspective Nov 19, 2021

Save to Folio

Exploits & Vulnerabilities

Squirrelwaffle Exploits ProxyShell and ProxyLogon to Hijack Email Chains

Squirrelwaffle is known for using the tactic of sending malicious spam as replies to existing email chains. We look into how by investigating its exploit of Microsoft Exchange Server vulnerabilities, ProxyLogon and ProxyShell.

Research Nov 19, 2021

Save to Folio

Research Nov 19, 2021

Save to Folio

Cyber Threats

Analyzing ProxyShell-related Incidents via Trend Micro Managed XDR

In this blog entry, we will take a look at the ProxyShell vulnerabilities that were being exploited in these events, and dive deeper into the notable post-exploitation routines that were used in four separate incidents involving these web shell attacks.

Research Nov 17, 2021

Save to Folio

Research Nov 17, 2021

Save to Folio

Compliance & Risks

Post-pandemic growth starts with understanding risk

The digital transformations that accompanied the pandemic are here to stay. To succeed in the post-pandemic era, organizations must come to a shared understanding about cybersecurity as a critical element of business risk.

Expert Perspective Nov 16, 2021

Save to Folio

Expert Perspective Nov 16, 2021

Save to Folio