1H’2021 Security Review Shows Active Cloud Attacks VP, Threat Intelligence
Trend Micro’s midyear report highlights the growing importance of cloud security as attacks increase in frequency and complexity. Read More HERE…
Trend Micro’s midyear report highlights the growing importance of cloud security as attacks increase in frequency and complexity. Read More HERE…
Our research paper provides an in-depth analysis of Earth Baku’s new cyberespionage campaign, particularly the group’s use of advanced malware tools and multiple attack vectors. Read More HERE…
While investigating the Confucius threat actor, we found a recent spear phishing campaign that utilizes Pegasus spyware-related lures to entice victims into opening a malicious document downloading a file stealer. Read More HERE…
DHS’s second issue requires pipeline operators to implement various cybersecurity measures to protect their operations from cyber attacks. This directive also builds upon the department’s May directive following the Colonial Pipeline attack. Read More HERE…
Trend Micro is helping customers natively deploy Infrastructure as Code (IaC) resources for security the same way as cloud native infrastructure in collaboration with AWS CloudFormation. Read More HERE…