Trend Micro and Snyk Significantly
Expand Partnership with Technology
Collaboration to Solve Open Source
Development Risks

Co-developed solution bridges the gap between DevOps and security
operations teams

Windows® Mac® AndroidTM iOS new Power Up

Trend Micro Named a Global
Cybersecurity Channel “Champion” by
Canalys

Global Cybersecurity Leadership Matrix recognizes Trend Micro’s commitment to the channel

Windows® Mac® AndroidTM iOS new Power Up

Research, News, and Perspective

Author: Mohamed Fahmy (Threat Researcher), Mahmoud Zohdy (Threat Researcher)

APT34 Deploys Phishing Attack With New Malware

We observed and tracked the advanced persistent threat (APT) APT34 group with a new malware variant accompanying a phishing attack comparatively similar to the SideTwist backdoor malware. Following the campaign, the group abused a fake license registration form of an African government agency to target a victim in Saudi Arabia.

Sep 29, 2023

Author: Srivathsa Sharma (Threats Researcher)

Examining the Activities of the Turla APT Group

We examine the campaigns of the cyberespionage group known as Turla over the years, with a special focus on the key MITRE techniques and the corresponding IDs associated with the threat actor group.

Sep 22, 2023

Author: Shannon Murphy (Risk and Threat Specialist)

Decoding Turla: Trend Micro's MITRE Performance

This year, the MITRE Engenuity ATT&CK evaluation tested cybersecurity vendors against simulated attack scenarios mimicking the adversary group “Turla.” Learn about Trend Micro's 100% successful protection performance.

Sep 21, 2023

DevOps Resource Center

CISO Resource Center

Author: William Malik (VP, Infrastructure Strategies, Trend Micro)

How to Improve Cybersecurity Awareness and Training

Bill Malik, former Research Director at Gartner, discusses how to leverage the Capability Maturity Model to create an effective awareness program.

Sep 28, 2023

Author: Alifiya Sadikali (Zero Trust Advocate)

Zero Trust Adoption: Tips to Win Over Leadership

Implementing Zero Trust can be difficult due to outdated systems, employee resistance, and cost. Yet, the benefits outweigh the challenges. It is key to use a platform that combines multiple security technologies to simplify IT and risk assessment, proper planning, and getting security buy-in from stakeholders, including your board of directors.

Sep 21, 2023

Author: William Malik (VP, Infrastructure Strategies, Trend Micro)

Protect CNC Machines in Networked IT/OT Environments

Networking IT/OT environments is a bit like walking a tightrope, balancing the pursuit of intelligence and efficiency against the risks of exposing OT systems to the wider world. Trend Micro recently teamed up with global machine tool company Celada to identify specific risks associated with industrial CNC machines—and how to mitigate them.

Sep 19, 2023

Media Contacts

Pick your region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
USA
media_relations@trendmicro.com
Priyanka Wani
AMEA
Amea_PR@trendmicro.com
Funda Cizgenakad
Europe
funda_cizgenakad@trendmicro.co.uk
Lorena Rodriguez
Latin America
lorena_rodriguez@trendmicro.com
Kaori Iizumi
Japan
pressweb@trendmicro.co.jp
Angela Chiang
Taiwan
angela_chiang@trend.com.tw

Discover Trend Micro

The history, people, and values behind the company.

  Media Coverage

Stay up-to-date
Get our news RSS.

Connect with us