Trend Micro Research : Web

Cybertron Reshapes AI Security as “Cyber Brain” Grows

Cybertron Reshapes AI Security as “Cyber Brain” Grows 2025-03-27 at 03:02 By Previously exclusive to Trend Vision One customers, select Trend Cybertron models, datasets and agents are now available via open-source. Build advanced security solutions and join us in developing the next generation of AI security technology. This article is an excerpt from Trend Micro […]

React to this headline:

Loading spinner

Cybertron Reshapes AI Security as “Cyber Brain” Grows Read More »

From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario

From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario 2025-03-05 at 09:50 By Trend Micro™ Managed XDR assisted in an investigation of a B2B BEC attack that unveiled an entangled mesh weaved by the threat actor with the help of a compromised server, ensnaring three business partners in a scheme that spanned

React to this headline:

Loading spinner

From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario Read More »

Chinese-Speaking Group Manipulates SEO with BadIIS

Chinese-Speaking Group Manipulates SEO with BadIIS 2025-02-07 at 11:48 By This blog post details our analysis of an SEO manipulation campaign targeting Asia. We also share recommendations that can help enterprises proactively secure their environment. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Chinese-Speaking Group Manipulates SEO with BadIIS Read More »

AI Pulse: The Good from AI and the Promise of Agentic

AI Pulse: The Good from AI and the Promise of Agentic 2024-12-03 at 03:54 By The perils of AI get a lot of airtime, but what are the upsides? This issue of AI Pulse looks at some of the good AI can bring, from strengthening cybersecurity to driving health breakthroughs—and how the coming wave of

React to this headline:

Loading spinner

AI Pulse: The Good from AI and the Promise of Agentic Read More »

5 AI Security Takeaways featuring Forrester

5 AI Security Takeaways featuring Forrester 2024-11-14 at 01:04 By Highlights from the recent discussion between Trend Micro’s David Roth, CRO Enterprise America, and guest speaker Jeff Pollard, VP, Principal Analyst, Forrester about AI hype versus reality and how to secure AI in the workplace. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

5 AI Security Takeaways featuring Forrester Read More »

SOC Around the Clock: World Tour Survey Findings

SOC Around the Clock: World Tour Survey Findings 2024-11-05 at 05:49 By Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what SOC teams had to say. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

SOC Around the Clock: World Tour Survey Findings Read More »

AI Pulse: Election Deepfakes, Disasters, Scams & more

AI Pulse: Election Deepfakes, Disasters, Scams & more 2024-10-31 at 22:02 By In the final weeks before November’s U.S. election, cybersecurity experts were calling October 2024 the “month of mischief”—a magnet for bad actors looking to disrupt the democratic process through AI-generated misinformation. This issue of AI Pulse looks at what can be done about

React to this headline:

Loading spinner

AI Pulse: Election Deepfakes, Disasters, Scams & more Read More »

5 AI Security Takeaways featuring Forrester

5 AI Security Takeaways featuring Forrester 2024-10-17 at 23:34 By Highlights from the recent discussion between Trend Micro’s David Roth, CRO Enterprise America, and guest speaker Jeff Pollard, VP, Principal Analyst, Forrester about AI hype versus reality and how to secure AI in the workplace. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

5 AI Security Takeaways featuring Forrester Read More »

Cybersecurity Compass: Bridging the Communication Gap

Cybersecurity Compass: Bridging the Communication Gap 2024-09-27 at 05:16 By Discover how to use the Cybersecurity Compass to foster effective conversations about cybersecurity strategy between non-technical and technical audiences, focusing on the phases of before, during, and after a breach. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Cybersecurity Compass: Bridging the Communication Gap Read More »

Cybersecurity Compass: An Integrated Cyber Defense Strategy

Cybersecurity Compass: An Integrated Cyber Defense Strategy 2024-08-02 at 22:17 By Explore how the Cybersecurity Compass can guide various security professionals’ and stakeholders’ decision-making before, during, and after a breach. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Cybersecurity Compass: An Integrated Cyber Defense Strategy Read More »

How to Write a Generative AI Cybersecurity Policy

How to Write a Generative AI Cybersecurity Policy 2024-07-29 at 13:01 By It’s clear that generative AI is a permanent addition to the enterprise IT toolbox. For CISOs, the pressure is on to roll out AI security policies and technologies that can mitigate very real and present risks. This article is an excerpt from Trend

React to this headline:

Loading spinner

How to Write a Generative AI Cybersecurity Policy Read More »

QR Codes: Convenience or Cyberthreat?

QR Codes: Convenience or Cyberthreat? 2024-07-23 at 20:16 By Security awareness and measures to detect and prevent sophisticated risks associated with QR code-based phishing attacks (quishing) This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

QR Codes: Convenience or Cyberthreat? Read More »

ISPM & ITDR Synergize for AI-Based Identity Security

ISPM & ITDR Synergize for AI-Based Identity Security 2024-05-22 at 23:31 By In the ever-evolving landscape of cybersecurity, staying ahead of malicious actors requires a multifaceted approach. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

ISPM & ITDR Synergize for AI-Based Identity Security Read More »

AI Auctions: Collectibles, Taylor Swift, Jordan Bots

AI Auctions: Collectibles, Taylor Swift, Jordan Bots 2024-03-06 at 06:48 By Discover the fascinating world of AI, ML, and RPA and their real-world applications including the creation of a custom RPA bot for collecting rare sports memorabilia. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this

React to this headline:

Loading spinner

AI Auctions: Collectibles, Taylor Swift, Jordan Bots Read More »

Decoding Digital Transformation: AI, ML, and RPA in the Modern Era

Decoding Digital Transformation: AI, ML, and RPA in the Modern Era 2024-02-21 at 04:31 By Explore the first article in this series about AI, ML, and RPA, which aims to demystify and explore the full spectrum of these core technologies. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Decoding Digital Transformation: AI, ML, and RPA in the Modern Era Read More »

What Generative AI Means for Cybersecurity in 2024

What Generative AI Means for Cybersecurity in 2024 2024-02-08 at 19:00 By After a full year of life with ChatGPT cybersecurity experts have a clearer sense of how criminals are using generative AI to enhance attacks – learn what generative AI means for cybersecurity in 2024. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

What Generative AI Means for Cybersecurity in 2024 Read More »

How the EU Cyber Resilience Act Impacts Manufacturers

How the EU Cyber Resilience Act Impacts Manufacturers 12/12/2023 at 22:01 By EU’s Cyber Resilience Act urges vendors to embrace security-by-design, establishing standards in global tech protocols. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

How the EU Cyber Resilience Act Impacts Manufacturers Read More »

Web Security Expands into Secure Service Edge (SSE)

Web Security Expands into Secure Service Edge (SSE) 09/12/2023 at 03:02 By Trend has been securing web access for over a decade with forward-looking innovation and a global footprint to support our customer’s security strategy. We are committed to our customers’ journey of transforming their current security posture, aligning with Zero Trust principles, and embracing

React to this headline:

Loading spinner

Web Security Expands into Secure Service Edge (SSE) Read More »

TrickBot & Conti Sanctions: Implications for CISOs & Boardrooms

TrickBot & Conti Sanctions: Implications for CISOs & Boardrooms 09/09/2023 at 01:01 By Discover what the increased regulatory risk due to recent US and UK sanctions imposed on TrickBot and Conti cybercriminals mean for CISOs and board members. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

TrickBot & Conti Sanctions: Implications for CISOs & Boardrooms Read More »

ChatGPT Shared Links and Information Protection: Risks and Measures Organizations Must Understand

ChatGPT Shared Links and Information Protection: Risks and Measures Organizations Must Understand 05/07/2023 at 16:31 By Since its initial release in late 2022, the AI-powered text generation tool known as ChatGPT has been experiencing rapid adoption rates from both organizations and individual users. However, its latest feature, known as Shared Links, comes with the potential

React to this headline:

Loading spinner

ChatGPT Shared Links and Information Protection: Risks and Measures Organizations Must Understand Read More »

Scroll to Top