• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Vulnerabilities

Risk Decisions in an Imperfect World

  • Posted on:June 30, 2020
  • Posted in:DevOps, Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

Risk decisions are the foundation of information security. Sadly, they are also one of the most often misunderstood parts of information security. This is bad enough on its own but can sink any effort at education as an organization moves towards a DevOps philosophy. To properly evaluate the risk of an event, two components are…

Read More
Tags: Cloud SecurityPrivacysecurityVulnerabilities

Cyberattack Lateral Movement Explained

  • Posted on:August 12, 2019
  • Posted in:Cybercrime
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

[Lightly edited transcript of the video above] Hi there, Mark Nunnikhoven from Trend Micro Research, I want to talk to you about the concept of lateral movement. And the reason why I want to tackle this today is because I’ve had some conversations in the last few days that have really kind of hit that…

Read More
Tags: cybercrimesecurityVulnerabilitiesXDR

How to get Ahead of Vulnerabilities and Protect your Enterprise Business

  • Posted on:March 12, 2019
  • Posted in:Current News, Security
  • Posted by:
    Trend Micro
0

Security vulnerabilities are popping up all the time, and can put any business that uses technological assets at risk. In a nutshell, vulnerabilities represent the ideal opportunity for malicious actors to break into systems and wreak all types of havoc. From data theft to information compromise and beyond, vulnerabilities are a particularly pertinent issue for…

Read More
Tags: exploitable vulnerabilitiesexploitssoftware vulnerabilitiesVulnerabilitieszero day vulnerabilitieszero-day

Attacking Containers and runC

  • Posted on:February 12, 2019
  • Posted in:Cloud, Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

This week a new vulnerability was published (CVE-2019-5736) that highlights everything bad and good about containers. Simply put, this vulnerability can be exploited using an infected container to attack the host. It’s a real world example of a breakout attack that has long been a major concern in virtualized and container environment. Here, the attack…

Read More
Tags: AWScloud computingContainersVulnerabilities

Incident Response In The Public Eye

  • Posted on:December 31, 2018
  • Posted in:Cybercrime, Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

Cyberattacks happen constantly. Every day organizations are attackers online whether they realize it or not. Most of these attacks are passing affairs. The mere fact that systems are on to the internet makes them a target of opportunity. For the most part, these attacks are non-events. Security software, bugs in attack code, and updated applications…

Read More
Tags: Compliance & RegulationsCurrent Newscybercrimeincident responseVulnerabilities

This Week in Security News: Security Predictions and Malware Attacks

  • Posted on:December 14, 2018
  • Posted in:Current News, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the span of categories for Trend Micro’s 2019 Security Predictions. Also, learn about a new exploit kit that targets home or small office routers which attacks…

Read More
Tags: Elasticsearchransomwaresecurity predictionsVulnerabilities

Which Threats had the Most Impact During the First Half of 2018?

  • Posted on:November 6, 2018
  • Posted in:Current News, Security
  • Posted by:
    Trend Micro
0

One of the best ways for organizations to shore up their data security efforts and work toward more proactive protection is by examining trends within the threat environment. Taking a look at the strategies for attack, infiltration and infection currently being utilized by hackers can point toward the types of security issues that will continue…

Read More
Tags: cryptocurrency minerCryptocurrency miningdata breachdata protectiondata securitymega breachransomwareVulnerabilities

Safeguarding the Nation’s Critical Infrastructure

  • Posted on:October 22, 2018
  • Posted in:Critical Infrastructure, Internet Safety, Security
  • Posted by:
    William "Bill" Malik (CISA VP Infrastructure Strategies)
0

In May of 1998, President Clinton issued Presidential Decision Directive 63: Protecting America’s Critical Infrastructures. This Directive proposed steps to enact the recommendations of the President’s Commission on Critical Infrastructure Protection, published in October 1997. Twenty years on, how are things going? The US Federal government has identified critical infrastructure sectors and associated each with…

Read More
Tags: Critical InfrastructureVulnerabilities

Drupal Latest Platform To Be Hit With Critical Vulnerability

  • Posted on:March 29, 2018
  • Posted in:Security, Vulnerabilities, Vulnerabilities & Exploits
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

Drupal is the latest platform to issue an emergency patch for a critical vulnerability. The issue (CVE-2018-7600) allows an attacker to execute code remotely with little effort. That’s bad. The Drupal team has been quick to respond and has already issued a patch and a mitigation for users unable to immediately patch. In addition to…

Read More
Tags: Current NewsVulnerabilitiesweb threats

How to Update Adobe Flash Player on a Mac

  • Posted on:March 26, 2018
  • Posted in:Consumer
  • Posted by:
    Trend Micro
0

Adobe Flash Player is a free software plug-in used by web browsers to view multimedia, execute rich Internet applications, and stream video on your Mac. Adobe Flash Player is the most popular multimedia player plug-in available. However, recently there have been security concerns which has threatened its popularity as users seek safer alternative solutions. Opera,…

Read More
Tags: AdobeAppleFirefoxFlash PlayerGoogle ChromemacOperaVulnerabilities
Page 1 of 1812 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • New Report: Top Three Ways to Drive Boardroom Engagement around Cybersecurity Strategy
  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.