Trend Micro Vision One 平台協助資訊保安營運團隊降低警示負荷

Windows® Mac® AndroidTM iOS new Power Up

趨勢科技研究發現 39% 員工以私人裝置存取公司資料

Windows® Mac® AndroidTM iOS new Power Up


Author: CH Lei (Threat Researcher)

Tracking Earth Aughisky’s Malware and Changes

For over 10 years, security researchers have been observing and keeping tabs of APT group Earth Aughisky’s malware families and the connections, including previously documented malware that have yet to be attributed.

Oct 04, 2022

Author: Joseph C Chen (Threat Researcher), Jaromir Horejsi (Threat Researcher)

Water Labbu Abuses Malicious DApps to Steal Cryptocurrency

The parasitic Water Labbu capitalizes on the social engineering schemes of other scammers, injecting malicious JavaScript code into their malicious decentralized application websites to steal cryptocurrency.

Oct 03, 2022

Author: David Fiser (Threat Researcher), Alfredo Oliveira (Sr. Security Researcher)

Stronger Cloud Security in Azure Functions Using Custom Cloud Container

In this entry, we discuss how developers can use custom cloud container image and the distroless approach to minimize security gaps in Azure Functions.

Sep 29, 2022

DevOps 資源中心

Author: Michael Langford (Product Marketing)

Common Cloud-Native Security Misconfigurations & Fixes

Cloud configuration errors are a major concern for modern DevOps teams, introducing a new attack surface with numerous potential points of vulnerability. Read on to discover some of the most common errors and learn how to resolve them.

Sep 30, 2022

Author: Duane Seon (Product Marketing)

Simplify with Network Security as a Service (NSaaS)

Learn more on how network security as a service (NSaaS) employs the latest technologies to counter unknown threats and detect abnormal behavior before it becomes a direct threat.

Sep 23, 2022

Author: Michael Langford (Product Marketing)

Top 5 CNAPP-Solved Security Challenges

Cloud-native application security solutions consist of various tools, each with its own objective - learn what security challenges CNAPP solves.

Sep 15, 2022

CISO 資源中心

Author: William Malik (VP, Infrastructure Strategies)

Cyber Security Framework: Back to Basics

Dr. Ivan Pavlov once said: “If you want new ideas, read old books.” The same applies with cybersecurity best practices. Discover how you can extend a basic cyber security framework to reduce systems and employee security risks.

Oct 04, 2022

Author: William Malik (VP, Infrastructure Strategies)

CISA Gov: '23-25 Plan Focuses on Unified Cybersecurity

William Malik, VP of Infrastructure Strategies, shares his opinions on the goals and objectives outlined in the CISA Strategic Plan 2023-2025.

Oct 03, 2022

Author: Chris LaFleur (Manager Threat IR and Forensics)

Incident Response Services & Playbooks Guide

63% of c-level executives in the US don’t have an incident response plan yet 50% of organizations experience a cyberattack. Explore incident response services and playbooks to strengthen your cyber defenses.

Sep 29, 2022



  • USA
  • 亞洲、中東及非洲地區
  • 歐洲
  • 拉丁美洲
  • 日本
  • 台灣
Kateri Daniels
+1 817 522 7911
Lisiane Lenz
+971 5057 85061
Funda Cizgenakad
+44 7876 616246
Lorena Rodriguez
+52 55 3067 6000
Kaori Iizumi
+81 3 5334 3658
+886 2376 1222




時刻取得最新資訊 RSS。