Trend Micro e Snyk ampliano significativamente
la partnership con una collaborazione
tecnologica per risolvere i rischi dello sviluppo
nel mondo open source

La soluzione sviluppata in collaborazione colma le distanze tra i DevOps e la sicurezza
team di operations

Windows® Mac® AndroidTM iOS new Power Up

Trend Micro nominato "campione" globale
del canale Cybersecurity da

Global Cybersecurity Leadership Matrix riconosce l'impegno di Trend Micro nei confronti del canale

Windows® Mac® AndroidTM iOS new Power Up

Ricerca, novità e prospettive

Autore: Katherine Casona (Threat Analyst), Ivan Nicole Chavez (Threat Analyst), Ieriz Nicolle Gonzalez (Threat Analyst), Jeffrey Francis Bonaobra (Threat Research Engineer)

Investigating BlackSuit Ransomware’s Similarities to Royal

In this blog entry, we analyze BlackSuit ransomware and how it compares to Royal Ransomware.

May 31, 2023

Autore: Feike Hacquebord (Sr. Threat Researcher), Stephen Hilt (Sr. Threat Researcher), Fernando Merces (Sr. Threat Researcher), Lord Alfred Remorin (Sr. Threat Researcher)

Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals

Void Rabisu, a malicious actor believed to be associated with the RomCom backdoor, was thought to be driven by financial gain because of its ransomware attacks. But in this blog entry, we discuss how the use of the RomCom backdoor in recent attacks shows how Void Rabisu's motives seem to have changed since at least October 2022.

May 30, 2023

Autore: Sarah Pearl Camiling (Threat Hunter), Paul John Bardon (Threat Hunter)

New Info Stealer Bandit Stealer Targets Browsers, Wallets

This is an analysis of Bandit Stealer, a new Go-based information-stealing malware capable of evading detection as it targets multiple browsers and cryptocurrency wallets.

May 26, 2023

Centro risorse DevOps

When is it time for a cyber hygiene audit?

Cyber hygiene is crucial for keeping your organization safe by limiting security breaches, threats against your IT infrastructure, and more. Read on to learn more about what makes up cyber hygiene, and how to audit its effectiveness.

May 30, 2023

Understanding XPath Injection Vulnerabilities

The ability to trigger XPath queries with user-supplied information introduces the risk of XPath injection attacks. Read on to explore how these attacks work and discover how to keep your XPath queries secure.

May 25, 2023

Autore: Michael Langford (Product Marketing)

Azure vs. AWS Developer Tools Guide

Azure vs. AWS — which should you use for your DevOps environment? Discover the differences, similarities, and use cases to make an informed decision.

May 19, 2023

Centro risorse CISO

Autore: William Malik (VP, Infrastructure Strategies, Trend Micro)

Moore's Law, Latent Demand, and the Slowing of Cloud Computing

A growing chorus of organizations are slowing their cloud computing and migration. William Malik, Trend Micro’s VP of Infrastructure Strategies, discusses why this is happening, and what it will mean for organizations’ long-term plans.

May 25, 2023

Autore: Chris LaFleur (Manager Threat IR and Forensics)

Against the Clock: Cyber Incident Response Plan

Conventional wisdom says most organizations will experience a cybersecurity breach at some point—if they haven’t already. That makes having a ready-to-launch incident response process crucial when an attack is detected, as this fictionalized scenario shows.

May 24, 2023

Autore: Mike Milner (Head of Product Management, Cloud One)

Accelerating Security Risk Management

In response to the expanding attack surface, Mike Milner, Trend Micro VP of Cloud Technology, explores the role security risk management plays in this new era of cybersecurity and how IT leaders are accelerating innovation.

May 18, 2023

Contatti per i media

Scegli la tua regione:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
1 (817) 522-7911
Lisiane Lenz
(971) 505785061
Lorenzo Gamba
+39 02 700 251
Lorena Rodriguez
Latin America
+52 55 3067-6000
Kaori Iizumi
Angela Chiang
+ 886 2376 1222

Scopri Trend Micro

La storia, le persone e i valori dietro l'azienda.

Mettiti in contatto con noi