Threat Intelligence Center

Deep Web

The Deep Web and the Cybercriminal Underground
Read more


Latest updates

Is There a Budding West African Underground Market?

In 2012, we predicted that we would soon see an African underground market take root. Our recent joint research effort with the INTERPOL on the West African threat landscape may just be even greater proof of that.
Read more

Targeted Attacks

The latest news and information on targeted attacks and IT security threats so you stay ahead of advanced persistent threats.
Read more


Latest updates

Cyber Threats to the Mining Industry

This research paper looks at the mining industry as a target for a broad set of threat actors, its role in regional and global supply chains, and its vulnerabilities.
Read more

Security Strategies for Enterprises

News and updates on the latest security threats to enterprises, and strategy guides on how to deal with them.
Read more


Latest updates

Leaking Beeps: Are Pagers Leaking Confidential Information?

“Leaking Beeps” is a series of studies by Trend Micro that aims to highlight a weakness in pager technology and how it can put critical activities of affected companies at risk.
Read more

Securing ICS Environments

News and research on threats to ICS/SCADA and protecting systems behind critical infrastructure
Read more


Latest updates

Are Your Industrial Plant Beepers Leaking Secrets?

With a little SDR knowledge and a $20 USB dongle, attackers can read unencrypted pager messages from far away. This time, we look at what that means for nuclear plants, HVAC, manufacturers and other industries still using pagers.
Read more

Internet of Things

The IoT connects things, people, processes and networks through the internet, but it could also be open to attacks that target it.
Read more


Latest updates

Protecting Physical Security Systems against Network Attacks

Smart security systems in buildings allow for easier, centralized management of security and safety, but these connected systems also come with exploitable vulnerabilities. This infographic provides a guide for managing these systems and securing devices.
Read more

Mobile Safety

News and updates on the latest threats for the mobile platform, as well as guides on how to protect your mobile devices.
Read more


Latest updates

A Practical Guide to Mobile Safety

As threats to mobile devices increase, developing good security habits becomes even more important. In this article, we detail current mobile threats and provide tips on how to secure mobile devices.
Read more