• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for January 2017

Threat Actors will come up with new Targeted Attack Tactics that Circumvent Current Anti-evasion Solutions

  • Posted on:January 31, 2017
  • Posted in:Cybercrime, Security, Underground Economy
  • Posted by:
    Jon Clay (Global Threat Communications)
0

In the Trend Micro 2017 Security Predictions report, we cover many of the threats that organizations will have to deal with this year and none could be more challenging that a targeted attack. We recently saw a report from the Identity Theft Resource Center which said 2016 had the most data breaches in US history. Within…

Read More

Industry Recognition adds to Trends Micro’s Exceptional Employer Reputation

  • Posted on:January 30, 2017
  • Posted in:Security, Trend Spotlight
  • Posted by:
    Bob Kedrosky
0

As a global leader in cybersecurity solutions Trend Micro takes helping to make the world safe for exchanging digital information very seriously. And for the past 27 years, we’ve taken our employees seriously. When you have an organization of more than 5,000 employees, it can sometimes be difficult to create a culture that means something…

Read More

Tipping Point Threat Intelligence and Zero-Day Coverage – Week of January 23, 2017

  • Posted on:January 27, 2017
  • Posted in:Network, Security, Zero Day Initiative
  • Posted by:
    Elisa Lippincott (Global Threat Communications)
0

They say security never sleeps. I wish I could go for days without sleeping, because I could get so much done. Unfortunately, we’re just not built that way, which explains why my post this week is a few hours later than usual. I could say, “better late than never,” but that would definitely not apply…

Read More

This Week in Security News

  • Posted on:January 27, 2017
  • Posted in:Current News
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for…

Read More

Will 2017 be the Year IoT Threats Go Mainstream?

  • Posted on:January 26, 2017
  • Posted in:Business, Internet of Everything, Security
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0

The Internet of Things (IoT) is changing the way we live and work forever. It makes us more productive, healthier and happier, and it enables businesses to work smarter, more efficiently and with greater agility. There’s just one problem: from a security perspective IoT devices are fundamentally flawed. And the bad guys are getting pretty…

Read More

Data Privacy Day 2017: Tips for Protecting Small Businesses

  • Posted on:January 26, 2017
  • Posted in:Business, Security, Small Business
  • Posted by:
    Ryan Delany
0

Data Privacy Day is on January 28, and I’m willing to bet this isn’t a day most people are aware of. However, with cyber threats such as ransomware, data breaches and Business Email Compromise (BEC) scams plaguing the small business landscape, spending time in observance of Data Privacy Day should be a priority. In 2016,…

Read More

This Week in Security News

  • Posted on:January 20, 2017
  • Posted in:Current News
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for…

Read More

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of January 16, 2017

  • Posted on:January 20, 2017
  • Posted in:Network, Security, Zero Day Initiative
  • Posted by:
    Elisa Lippincott (Global Threat Communications)
0

I thought I was going to start a riot earlier this week. The Major League Baseball Hall of Fame was set to announce their 2017 class and my favorite player of all time was on the ballet again. His career statistics are those that many professional baseball players dream of (449 home runs and .540…

Read More

Trend Micro TippingPointÂŽ Named a Leader in 2017 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS)

  • Posted on:January 19, 2017
  • Posted in:Network, Security
  • Posted by:
    Elisa Lippincott (Global Threat Communications)
0
California takes a big step forward in the fight against ransomware.

Trend Micro TippingPoint has been named a Leader in the Gartner 2017 Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS). With improvements in both Completeness of Vision and Ability to Execute from previous years, we believe that placement in the Leaders’ quadrant illustrates the positive progress we’ve made since the acquisition of TippingPoint in March 2016…

Read More

Pwn2Own™ Returns for 2017 to Celebrate 10 Years of Exploits

  • Posted on:January 18, 2017
  • Posted in:Internet of Everything, Network, Security, Zero Day Initiative
  • Posted by:
    Brian Gorenc
0
Hackers make online life difficult.

We are nine weeks away from the Pwn2Own™ 2017 security contest returning to CanSecWest, which is celebrating its 10th anniversary this year. A lot has changed in the world since the first Pwn2Own in 2007. The computing space has changed drastically, as well. The first Pwn2Own happened before Conficker or Stuxnet. It happened before the…

Read More
Tags: Pwn2OwnZDI
Page 1 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, MĂŠxico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, EspaĂąa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.