Trend Micro y Snyk
amplían significativamente el partnership con tecnología
Colaboración para solucionar riesgos de implementación
del open source

La solución desarrollada conjuntamente facilita la interconexión entre los equipos de operaciones de seguridad
y los de devops

Windows® Mac® AndroidTM iOS new Power Up

Trend Micro nombrado «Campeón»
del canal de ciberseguridad global por

La matriz de liderazgo de ciberseguridad global reconoce el compromiso de Trend Micro con el canal

Windows® Mac® AndroidTM iOS new Power Up

Investigación, noticias y perspectivas

Author: Vladimir Kropotov (Sr. Threat Researcher), Fyodor Yarochkin (Sr. Threat Researcher), Craig Gibson (Sr. Threat Researcher), Stephen Hilt (Sr. Threat Researcher)

How Underground Groups Use Stolen Identities and Deepfakes

The growing appearance of deepfake attacks is significantly reshaping the threat landscape. These fakes brings attacks such as business email compromise (BEC) and identity verification bypassing to new levels.

Sep 27, 2022

Author: Sunil Bharti (Senior Threat Researcher)

Atlassian Confluence Vulnerability CVE-2022-26134 Abused For Cryptocurrency Mining, Other Malware

Users are advised to patch immediately: We found exploit samples abusing the Atlassian Confluence vulnerability (CVE-2022-26134) in the wild for malicious cryptocurrency mining.

Sep 21, 2022

Author: Ryan Flores (Sr. Manager, Threat Research), Charles Perine (Sr. Threat Researcher), Lord Alfred Remorin (Sr. Threat Researcher), Roel Reyes (Sr. Threat Researcher)

Security Risks in Logistics APIs Used by E-Commerce Platforms

Our research examines the security flaws that we found in the logistics API implementation of e-commerce platforms that can potentially expose the consumers’ personal information. We discuss the security risks that such flaws present for software engineers, e-commerce platform providers, and consumers.

Sep 20, 2022

Centro de recursos de DevOps

Author: Duane Seon (Product Marketing)

Simplify with Network Security as a Service (NSaaS)

Learn more on how network security as a service (NSaaS) employs the latest technologies to counter unknown threats and detect abnormal behavior before it becomes a direct threat.

Sep 23, 2022

Author: Michael Langford (Product Marketing)

Top 5 CNAPP-Solved Security Challenges

Cloud-native application security solutions consist of various tools, each with its own objective - learn what security challenges CNAPP solves.

Sep 15, 2022

Author: Michael Langford (Product Marketing)


This article will explore three solutions, CIEM, CWPP, and CSPM, detail a sample case for each, and help you to determine when and how to use them—whether individually or in conjunction with one another.

Sep 08, 2022

Centro de recursos de CISO

Author: Jon Clay (VP, Threat Intelligence), Ed Cabrera (Chief Cybersecurity Officer)

Preventing Cryptocurrency Cyber Extortion

Highly destructive cybercrime is on the rise, and most of it is being funded with anonymous cryptocurrency. Discover cryptocurrency trends and how enterprises can enhance their cybersecurity posture to prevent cyber extortion.

Sep 27, 2022

Author: Jon Clay (VP, Threat Intelligence)

How to Prevent Ransomware as a Service (RaaS) Attacks

Explore key insights on how ransomware as a service (RaaS) operators work and how to prevent ransomware attacks.

Sep 22, 2022

Author: Greg Young (VP of Cybersecurity, Trend Micro)

Cybersecurity Awareness Month 2022: 3 Actionable Tips

Make Cybersecurity Awareness Month a year-long initiative with these three actionable security tips to reduce cyber risk across the attack surface.

Sep 20, 2022

Contactos de los medios

Seleccione su región:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
1 (817) 522-7911
Lisiane Lenz
(971) 505785061
Jose Campo
+34 91 369 70 30
Lorena Rodriguez
Latin America
+52 55 3067-6000
Kaori Iizumi
Angela Chiang
+ 886 2376 1222

Descubra Trend Micro

La historia, las personas y los valores detrás de la empresa.

Conéctese con nosotros