Исследования и отчеты

Fake Company, Real Threats: Logs From a Smart Factory Honeypot

To determine threat actors' degree of knowledge in compromising a smart factory, we deployed our most elaborate honeypot to date. The incidents we observed show the kinds of attacks that can easily affect poorly secured manufacturing environments.

Ознакомиться со статьей   

Keeping abreast of today’s threat landscape is non-negotiable. Enterprises, service providers, and the Internet-at-large would benefit in knowing the latest in technology and threats so they can actively secure their data and systems against compromise. Skimming security news provides a high-level idea of what’s going on in the real world, but to build effective security strategies, organizations and individuals need to get a better look of what goes on beyond the surface.

Все исследования

Access research papers and articles by our security experts and analysts
Ознакомиться со статьей


Последние обновления

Fake Company, Real Threats: Logs From a Smart Factory Honeypot

To determine threat actors' degree of knowledge in compromising a smart factory, we deployed our most elaborate honeypot to date. The incidents we observed show the kinds of attacks that can easily affect poorly secured manufacturing environments.
Ознакомиться со статьей

    Raporty o zagrożeniach

    Download our latest TrendLabs Security Roundups and Predictions reports
    Ознакомиться со статьей


    Последние обновления

    Evasive Threats, Pervasive Effects

    Our midyear security roundup highlights threats that made their mark in the first half of 2019, and provides security insights to help users and organizations determine the right solutions and defense strategies against them.
    Ознакомиться со статьей

      Download our latest TrendLabs Security Predictions

      Последние обновления

      Trend Micro Security Predictions for 2020: The New Norm

      Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
      Ознакомиться со статьей