Research and Analysis

Lost in Translation: When Industrial Protocol Translation goes Wrong

This research paper looks at protocol gateways, which translate various protocols used by different industrial devices and machinery, and provides insight into the security issues and vulnerabilities found in these devices as well as ways to secure them.

Read more   

Keeping abreast of today’s threat landscape is non-negotiable. Enterprises, service providers, and the Internet-at-large would benefit in knowing the latest in technology and threats so they can actively secure their data and systems against compromise. Skimming security news provides a high-level idea of what’s going on in the real world, but to build effective security strategies, organizations and individuals need to get a better look of what goes on beyond the surface.

Research

Access research papers and articles by our security experts and analysts
Read more


Latest updates

Lost in Translation: When Industrial Protocol Translation goes Wrong

This research paper looks at protocol gateways, which translate various protocols used by different industrial devices and machinery, and provides insight into the security issues and vulnerabilities found in these devices as well as ways to secure them.
Read more

    Threat Reports

    Download our latest TrendLabs Security Roundups and Predictions reports
    Read more


    Latest updates

    Review, Refocus, and Recalibrate: The 2019 Mobile Threat Landscape

    In 2019, cybercriminals looked at the malicious mobile routines that worked in the past and adjusted these to make them more sophisticated, persistent, and profitable online and offline.
    Read more

      Download our latest TrendLabs Security Predictions

      Latest updates

      Trend Micro Security Predictions for 2020: The New Norm

      Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
      Read more