News & Updates
- May 28, 2020Are your smart devices vulnerable? Here are common vulnerabilities found in IoT devices and how to secure against them.
- May 27, 2020Cloud-native security adopts the defense-in-depth approach and divides the security strategies utilized in cloud-native systems into four different layers: cloud, container, cluster, code.
- May 27, 2020We analyzed the critical vulnerabilities affecting Salt, their patches, and some threats exploiting them.
- May 26, 2020An Investigation into the Current Condition of Underground Markets and Cybercriminal Forums
- May 25, 2020We have seen events that point to the resurgence of Qakbot, a multi-component, information-stealing threat first discovered in 2007.
- May 22, 2020Ian Keller, Chief Security Officer of SBV Services in South Africa, recently sat down with Trend Micro and shared his thoughts on how his organization is coping with the current pandemic.
- May 19, 2020A phishing site was found using a spoofed Netflix page to harvest account information, credit card credentials, and other PII.
- May 14, 2020When it comes to cloud computing security, or simply, cloud security, what are the builders’ responsibilities? How can developers and administrators ensure cloud security? This primer discusses the key concepts of cloud security and which areas need to be protected using flexible and comprehensive security solutions.
- May 11, 2020Through a thorough analysis of an actual smart manufacturing environment, our in-depth security research explores several attack vectors that could be used by threat actors to launch unconventional attacks on smart manufacturing systems.