undefined
  • No new notifications at this time.
  • Scan Engines
  • All Pattern Files
  • All Downloads
  • Subscribe to Download Center RSS
  • Find a Partner
  • Home Office Online Store
  • Renew Online
  • Contact Sales
  • Locations Worldwide
  • +202 25869400
  • The Americas
  • United States
  • Brasil
  • Canada
  • México
  • Middle East & Africa
  • South Africa
  • Middle East and North Africa
  • Europe
  • België (Belgium)
  • Česká Republika
  • Danmark
  • Deutschland, Österreich Schweiz
  • España
  • France
  • Ireland
  • Italia
  • Nederland
  • Norge (Norway)
  • Polska (Poland)
  • Suomi (Finland)
  • Sverige (Sweden)
  • Türkiye (Turkey)
  • United Kingdom
  • Asia & Pacific
  • Australia
  • Центральная Азия (Central Asia)
  • Hong Kong (English)
  • 香港 (中文) (Hong Kong)
  • भारत गणराज्य (India)
  • Indonesia
  • 日本 (Japan)
  • 대한민국 (South Korea)
  • Malaysia
  • Монголия (Mongolia) and рузия (Georgia)
  • New Zealand
  • Philippines
  • Singapore
  • 台灣 (Taiwan)
  • ประเทศไทย (Thailand)
  • Việt Nam
  • My Support
  • Log In to Support
  • Partner Portal
  • Home Solutions
  • My Account
  • Lost Device Portal
  • Trend Micro Vault
  • Password Manager
  • Customer Licensing Portal
  • Online Case Tracking
  • Premium Support
  • Worry-Free Business Security Services
  • Remote Manager
  • Cloud One
  • Referral Affiliate
  • Cloud
  • Detection and Response
  • User Protection
  • Contact Sales
  • Locations
  • Support
  • Find a Partner
  • Learn of upcoming events
  • Social Media Networks
  • Facebook
  • Twitter
  • Linkedin
  • Youtube
  • Instagram
  • 1-888-762-8736 (M-F 8-5 CST)
Trend Micro Security Trend Micro Security
Business 
For Home 
Trend Micro One - our unified cybersecurity platform >
Hybrid Cloud Security
Workload Security
Conformity
Container Security
File Storage Security
Application Security
Network Security
Open Source Security
Network Security
Intrusion Prevention
Advanced Threat Protection
Industrial Network Security
Mobile Network Security
Zero Trust Secure Access
User Protection
Endpoint Security
Email Security
Mobile Security
Web Security
Industrial Endpoint
Detection & Response
XDR
Attack Surface Risk Management
Powered by
AI/Machine Learning
Global Threat Intelligence
All Products & Trials
Our Unified Platform
Service Packages
Small & Midsize Business Security
For Cloud
Cloud Migration
Cloud-Native App Development
Cloud Operational Excellence
Data Center Security
SaaS Applications
Internet of Things (IoT)
ICS / OT
Connected Car
5G Security for Enterprises
Risk Management
Ransomware
Cyber Insurance
End-of-Support Systems
Compliance
Detection and Response
Industries
Healthcare
Manufacturing
Oil & Gas
Electric Utility
Knowledge Hub
The Trend Micro Difference
Customer Successes
Strategic Alliances
Industry Leadership
Research
About Our Research
Research and Analysis
Research, News and Perspectives
Security Reports
Security News
Zero Day Initiative (ZDI)
Blog
Research by Topic
Vulnerabilities
Annual Predictions
The Deep Web
Internet of Things (IoT)
Resources
DevOps Resource Center
CISO Resource Center
What Is?
Threat Encyclopedia
Cloud Health Assessment
Cyber Risk Assessment
Enterprise Guides
Glossary of Terms
Explore the Cyber Risk Index (CRI)
Explore the Cyber Risk Index (CRI)

Use the CRI to assess your organization’s preparedness against attacks, and get a snapshot of cyber risk across organizations globally.

Calculate your risk
Services
Service Packages
Managed XDR
Support Services
Business Support
Log In to Support
Technical Support
Virus & Threat Help
Renewals & Registration
Education & Certification
Contact Support
Downloads
Free Cleanup Tools
Find a Support Partner
For Popular Products
Deep Security
Apex One
Worry-Free
Worry-Free Renewals
Channel Partners
Channel Partner Overview
Managed Service Provider
Cloud Service Provider
Professional Services
Resellers
Marketplace
System Integrators
Alliance Partners
Alliance Overview
Technology Alliance Partners
Our Alliance Partners
Tools and Resources
Find a Partner
Education and Certification
Partner Successes
Distributors
Partner Login
Overview
Leadership
Customer Success Stories
Strategic Alliances
Industry Accolades
Newsroom
Webinars
Events
Security Experts
Careers
History
Corporate Social Responsibility
Diversity, Equity & Inclusion
Internet Safety and Cybersecurity Education
Investors
Privacy and Legal
    undefined
  • No new notifications at this time.
  • Scan Engines
  • All Pattern Files
  • All Downloads
  • Subscribe to Download Center RSS
  • Find a Partner
  • Home Office Online Store
  • Renew Online
  • Contact Sales
  • Locations Worldwide
  • +202 25869400
  • The Americas
  • United States
  • Brasil
  • Canada
  • México
  • Middle East & Africa
  • South Africa
  • Middle East and North Africa
  • Europe
  • België (Belgium)
  • Česká Republika
  • Danmark
  • Deutschland, Österreich Schweiz
  • España
  • France
  • Ireland
  • Italia
  • Nederland
  • Norge (Norway)
  • Polska (Poland)
  • Suomi (Finland)
  • Sverige (Sweden)
  • Türkiye (Turkey)
  • United Kingdom
  • Asia & Pacific
  • Australia
  • Центральная Азия (Central Asia)
  • Hong Kong (English)
  • 香港 (中文) (Hong Kong)
  • भारत गणराज्य (India)
  • Indonesia
  • 日本 (Japan)
  • 대한민국 (South Korea)
  • Malaysia
  • Монголия (Mongolia) and рузия (Georgia)
  • New Zealand
  • Philippines
  • Singapore
  • 台灣 (Taiwan)
  • ประเทศไทย (Thailand)
  • Việt Nam
  • My Support
  • Log In to Support
  • Partner Portal
  • Home Solutions
  • My Account
  • Lost Device Portal
  • Trend Micro Vault
  • Password Manager
  • Customer Licensing Portal
  • Online Case Tracking
  • Premium Support
  • Worry-Free Business Security Services
  • Remote Manager
  • Cloud One
  • Referral Affiliate
  • Cloud
  • Detection and Response
  • User Protection
  • Contact Sales
  • Locations
  • Support
  • Find a Partner
  • Learn of upcoming events
  • Social Media Networks
  • Facebook
  • Twitter
  • Linkedin
  • Youtube
  • Instagram
  • 1-888-762-8736 (M-F 8-5 CST)
  • No new notifications at this time.
  • No new notifications at this time.
  • Scan Engines
  • All Pattern Files
  • All Downloads
  • Subscribe to Download Center RSS
  • Find a Partner
  • Home Office Online Store
  • Renew Online
  • Contact Sales
  • Locations Worldwide
  • +202 25869400
    • The Americas
    • United States
    • Brasil
    • Canada
    • México
    • Middle East & Africa
    • South Africa
    • Middle East and North Africa
    • Europe
    • België (Belgium)
    • Česká Republika
    • Danmark
    • Deutschland, Österreich Schweiz
    • España
    • France
    • Ireland
    • Italia
    • Nederland
    • Norge (Norway)
    • Polska (Poland)
    • Suomi (Finland)
    • Sverige (Sweden)
    • Türkiye (Turkey)
    • United Kingdom
    • Asia & Pacific
    • Australia
    • Центральная Азия (Central Asia)
    • Hong Kong (English)
    • 香港 (中文) (Hong Kong)
    • भारत गणराज्य (India)
    • Indonesia
    • 日本 (Japan)
    • 대한민국 (South Korea)
    • Malaysia
    • Монголия (Mongolia) and рузия (Georgia)
    • New Zealand
    • Philippines
    • Singapore
    • 台灣 (Taiwan)
    • ประเทศไทย (Thailand)
    • Việt Nam
  • My Support
  • Log In to Support
  • Partner Portal
  • Home Solutions
  • My Account
  • Lost Device Portal
  • Trend Micro Vault
  • Password Manager
  • Customer Licensing Portal
  • Online Case Tracking
  • Premium Support
  • Worry-Free Business Security Services
  • Remote Manager
  • Cloud One
  • Referral Affiliate
  • Cloud
  • Detection and Response
  • User Protection
  • Contact Sales
  • Locations
  • Support
  • Find a Partner
  • Learn of upcoming events
  • Social Media Networks
  • Facebook
  • Twitter
  • Linkedin
  • Youtube
  • Instagram
  • 1-888-762-8736 (M-F 8-5 CST)
    undefined
  • Research & Analysis
  • Research

Research

PREVIOUS
  • PAGES:
  • 1
  • ...
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • Defining Defense in 2013

    Targeted attack incidents from previous years prove that targeted campaigns don't always use the same attack methods. Diversifying defense measures such as log inspection, virtual patching, and the like can help minimize the risks they may face in 2013.
    Read more   
  • Taidoor Campaign Targets Government Agencies in Taiwan

    The Taidoor campaign primarily targeted government organizations located in Taiwan. Trend Micro Research was able to develop indicators of compromise useful in determining if an attack is underway in an enterprise.
    Read more   
  • Better Targeted Attack Response Requires Mindset Change

    Trend Micro cyber security vice president Tom Kellerman says organizations must change the way they think about security when dealing with targeted attacks. Their IT teams must always assume compromise and build their company’s strategies from there.
    Read more   
  • Android, Mac OS X Malware Join Other Targeted Attack Tools

    Attackers have upped the ante by adding Android and Mac OS X to their targeted attack arsenal. Android malware, already a cybercriminal favorite, allows attackers to hop on the BYOD wagon, while Mac OS X malware broadens their scope of potential victims.
    Read more   
  • IXESHE Campaign Actors Zero in on East Asian Governments and Industries

    The IXESHE attackers are notable for their use of compromised machines within a target’s internal network as C&C servers. While the malware used in the attacks were not very complicated by nature, these proved very effective. This campaign remains an activ
    Read more   
  • Luckycat Redux Campaign Attacks Multiple Targets in India and Japan

    The Taidoor campaign primarily targeted government organizations located in Taiwan. Trend Micro Research was able to develop indicators of compromise useful in determining if an attack is underway in an enterprise.
    Read more   
  • Targeted Attacks Call For a Different Approach

    Their use of social engineering, vulnerability exploits, a specialized malware not only make targeted attack campaigns high-priority threats, they also make them difficult to defend against. To mitigate such threats, a custom defense strategy is required.
    Read more   
  • Lurid Downloader Campaign Actors Focus on Russia and the CIS

    The threat actors behind “Lurid Downloader” launched 301 malware campaigns that targeted entities in specific countries or geographic regions and added a means to track the success of each one.
    Read more   
  • PAGES:
  • 1
  • ...
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
PREVIOUS
  • Contact Sales
  • Locations
  • Careers
  • Newsroom
  • Trust Center
  • Privacy
  • Accessibility
  • Support
  • Site map
  • linkedin
  • twitter
  • facebook
  • youtube
  • instagram
  • rss
Copyright © 2022 Trend Micro Incorporated. All rights reserved.