Research, News, and Perspective

Author: Cedric Pernet (Sr. Threat Researcher), Joseph C Chen (Threat Researcher)

Impulse Team’s Massive Years-Long Mostly-Undetected Cryptocurrency Scam

We have been able to uncover a massive cryptocurrency scam involving more than a thousand websites handled by different affiliates linked to a program called Impulse Project, run by a threat actor named Impulse Team.

Jun 06, 2023

Author: Earle Maui Earnshaw (Threats Analyst), Nathaniel Morales (Threat Analyst), Katherine Casona (Threat Analyst), Don Ovid Ladores (Threats Analyst)

Xollam, the Latest Face of TargetCompany

This blog talks about the latest TargetCompany ransomware variant, Xollam, and the new initial access technique it uses. We also investigate previous variants' behaviors and the ransomware family's extortion scheme.

Jun 06, 2023

Author: Erin Sindelar (Threat Researcher)

Trend is a Launch Partner for Amazon Security Lake

Trend Micro is proud to be a launch partner for Amazon Security Lake, which puts the customer in control, making critical data available to them from third-party security and analytics solutions of their choice.

Jun 02, 2023

DevOps Resource Center

Author: Sterling Davis (Technical Product Manager)

Event-Driven Architecture & the Security Implications

This article explores the benefits of event-driven architecture for developers and best practices for mitigating security concerns.

Jun 06, 2023

When is it time for a cyber hygiene audit?

Cyber hygiene is crucial for keeping your organization safe by limiting security breaches, threats against your IT infrastructure, and more. Read on to learn more about what makes up cyber hygiene, and how to audit its effectiveness.

May 30, 2023

Understanding XPath Injection Vulnerabilities

The ability to trigger XPath queries with user-supplied information introduces the risk of XPath injection attacks. Read on to explore how these attacks work and discover how to keep your XPath queries secure.

May 25, 2023

CISO Resource Center

What is Secure Web Gateway’s (SWG) Role in Zero Trust?

Explore why secure web gateway (SWG) is important to effectively secure cloud resources and reduce cyber risk across the attack surface and the role a zero trust strategy can play.

Jun 06, 2023

Author: Greg Young (VP of Cybersecurity, Trend Micro)

Generative AI: What Every CISO Needs to Know

New technologies always change the security landscape, but few are likely to have the transformative power of generative AI. As platforms like ChatGPT continue to catch on, CISOs need to understand the unprecedented cybersecurity risks they bring—and what to do about them.

Jun 01, 2023

Worldwide 2022 Email Phishing Statistics and Examples

Explore the need for going beyond built-in Microsoft 365 and Google Workspace™ security based on email threats detected in 2022.

May 31, 2023

Media Contacts

Pick your region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
1 (817) 522-7911
Priyanka Wani
Funda Cizgenakad
+44 7876 616246
Lorena Rodriguez
Latin America
+52 55 3067-6000
Kaori Iizumi
Angela Chiang
+ 886 2376 1222

Discover Trend Micro

The history, people, and values behind the company.

  Media Coverage

Stay up-to-date
Get our news RSS.

Connect with us