Trend Micro Research : Privacy & Risks

Gartner 2024 CNAPP Market Guide Insights for Leaders

Gartner 2024 CNAPP Market Guide Insights for Leaders 2024-10-18 at 19:46 By As businesses increasingly pivot to cloud-native applications, the landscape of cybersecurity becomes ever more challenging. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Gartner 2024 CNAPP Market Guide Insights for Leaders Read More »

Cybersecurity Compass: Bridging the Communication Gap

Cybersecurity Compass: Bridging the Communication Gap 2024-09-27 at 05:16 By Discover how to use the Cybersecurity Compass to foster effective conversations about cybersecurity strategy between non-technical and technical audiences, focusing on the phases of before, during, and after a breach. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Cybersecurity Compass: Bridging the Communication Gap Read More »

Complete Guide to Protecting Seven Attack Vectors

Complete Guide to Protecting Seven Attack Vectors 2024-08-27 at 18:31 By The quicker a cyberattack is identified, the less it costs. Jon Clay, VP of Threat Intelligence, reviews seven key initial attack vectors and provides proactive security tips to help you reduce cyber risk across the attack surface. This article is an excerpt from Trend

React to this headline:

Loading spinner

Complete Guide to Protecting Seven Attack Vectors Read More »

Cybersecurity Compass: An Integrated Cyber Defense Strategy

Cybersecurity Compass: An Integrated Cyber Defense Strategy 2024-08-02 at 22:17 By Explore how the Cybersecurity Compass can guide various security professionals’ and stakeholders’ decision-making before, during, and after a breach. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Cybersecurity Compass: An Integrated Cyber Defense Strategy Read More »

Why NDR is Key to Cyber ‘Pest Control’

Why NDR is Key to Cyber ‘Pest Control’ 2024-07-23 at 19:16 By Intruders are drawn to enterprise IT environments the way mice are attracted to houses. And once either kind of invader is inside, they can be hard to get out. Network detection and response (NDR) lets you trace intruders’ pathways to find out where

React to this headline:

Loading spinner

Why NDR is Key to Cyber ‘Pest Control’ Read More »

An In-Depth Look at Crypto-Crime in 2023 Part 2

An In-Depth Look at Crypto-Crime in 2023 Part 2 2024-07-12 at 02:01 By In 2023, the cryptocurrency industry faced a significant increase in illicit activities, including money laundering, fraud, and ransomware attacks. Ransomware attacks were especially prevalent and profitable for attackers. However, other forms of criminal activity also saw a rise. This article is an

React to this headline:

Loading spinner

An In-Depth Look at Crypto-Crime in 2023 Part 2 Read More »

An In-Depth Look at Crypto-Crime in 2023 Part 1

An In-Depth Look at Crypto-Crime in 2023 Part 1 2024-07-08 at 22:31 By Cybersecurity is a growing concern in today’s digital age, as more sensitive information is stored and transmitted online. With the rise of cryptocurrencies, there has also been a rise in crypto-crimes, which pose a significant threat to the security of both individuals

React to this headline:

Loading spinner

An In-Depth Look at Crypto-Crime in 2023 Part 1 Read More »

Worldwide 2023 Email Phishing Statistics and Examples

Worldwide 2023 Email Phishing Statistics and Examples 2024-06-20 at 19:46 By Explore the need for going beyond built-in Microsoft 365 and Google Workspace™ security based on email threats detected in 2023. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Worldwide 2023 Email Phishing Statistics and Examples Read More »

A SANS’s 2024 Threat-Hunting Survey Review

A SANS’s 2024 Threat-Hunting Survey Review 2024-06-05 at 00:16 By In its ninth year, the annual SANS Threat Hunting Survey delves into global organizational practices in threat hunting, shedding light on the challenges and adaptations in the landscape over the past year. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

A SANS’s 2024 Threat-Hunting Survey Review Read More »

It’s Time to Up-Level Your EDR Solution

It’s Time to Up-Level Your EDR Solution 2024-06-03 at 18:01 By You may have EDR, but did you know you can add threat detection and response to improve a SecOps team’s efficiency and outcomes – read more. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this

React to this headline:

Loading spinner

It’s Time to Up-Level Your EDR Solution Read More »

ISPM & ITDR Synergize for AI-Based Identity Security

ISPM & ITDR Synergize for AI-Based Identity Security 2024-05-22 at 23:31 By In the ever-evolving landscape of cybersecurity, staying ahead of malicious actors requires a multifaceted approach. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

ISPM & ITDR Synergize for AI-Based Identity Security Read More »

A Necessary Digital Odyssey of RPA and AI/ML at HUD

A Necessary Digital Odyssey of RPA and AI/ML at HUD 2024-03-13 at 05:57 By Explore two RPA and AI/ML use cases at HUD during the operational challenges of the longest US Government shutdown, a rigid legacy IT environment, and complex federal regulations. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

A Necessary Digital Odyssey of RPA and AI/ML at HUD Read More »

AI Auctions: Collectibles, Taylor Swift, Jordan Bots

AI Auctions: Collectibles, Taylor Swift, Jordan Bots 2024-03-06 at 06:48 By Discover the fascinating world of AI, ML, and RPA and their real-world applications including the creation of a custom RPA bot for collecting rare sports memorabilia. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this

React to this headline:

Loading spinner

AI Auctions: Collectibles, Taylor Swift, Jordan Bots Read More »

Decoding Digital Transformation: AI, ML, and RPA in the Modern Era

Decoding Digital Transformation: AI, ML, and RPA in the Modern Era 2024-02-21 at 04:31 By Explore the first article in this series about AI, ML, and RPA, which aims to demystify and explore the full spectrum of these core technologies. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Decoding Digital Transformation: AI, ML, and RPA in the Modern Era Read More »

Accelerating into 2024 with NEOM McLaren Formula E Team

Accelerating into 2024 with NEOM McLaren Formula E Team 05/12/2023 at 22:02 By Learn more about how Trend is engineering innovation and resiliency with NEOM McLaren Formula E Team in 2024 and beyond. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Accelerating into 2024 with NEOM McLaren Formula E Team Read More »

Attacks on 5G Infrastructure From Users’ Devices

Attacks on 5G Infrastructure From Users’ Devices 20/09/2023 at 11:03 By Crafted packets from cellular devices such as mobile phones can exploit faulty state machines in the 5G core to attack cellular infrastructure. Smart devices that critical industries such as defense, utilities, and the medical sectors use for their daily operations depend on the speed,

React to this headline:

Loading spinner

Attacks on 5G Infrastructure From Users’ Devices Read More »

The Current Security State of Private 5G Networks

The Current Security State of Private 5G Networks 18/08/2023 at 19:01 By Private 5G networks offer businesses enhanced security, reliability, and scalability. Learn more about why private 5G could be the future of secure networking. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

The Current Security State of Private 5G Networks Read More »

ChatGPT Shared Links and Information Protection: Risks and Measures Organizations Must Understand

ChatGPT Shared Links and Information Protection: Risks and Measures Organizations Must Understand 05/07/2023 at 16:31 By Since its initial release in late 2022, the AI-powered text generation tool known as ChatGPT has been experiencing rapid adoption rates from both organizations and individual users. However, its latest feature, known as Shared Links, comes with the potential

React to this headline:

Loading spinner

ChatGPT Shared Links and Information Protection: Risks and Measures Organizations Must Understand Read More »

SeroXen Incorporates Latest BatCloak Engine Iteration

SeroXen Incorporates Latest BatCloak Engine Iteration 15/06/2023 at 12:16 By We looked into the documented behavior of SeroXen malware and noted the inclusion of the latest iteration of the batch obfuscation engine BatCloak to generate a fully undetectable (FUD) .bat loader. This is the second part of a three-part series documenting the abuse of BatCloak’s

React to this headline:

Loading spinner

SeroXen Incorporates Latest BatCloak Engine Iteration Read More »

Analyzing the FUD Malware Obfuscation Engine BatCloak

Analyzing the FUD Malware Obfuscation Engine BatCloak 09/06/2023 at 13:01 By We look into BatCloak engine, its modular integration into modern malware, proliferation mechanisms, and interoperability implications as malicious actors take advantage of its fully undetectable (FUD) capabilities. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

Analyzing the FUD Malware Obfuscation Engine BatCloak Read More »

Scroll to Top