Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
A Dive into Earth Baku’s Latest Campaign
Targeted Attacks

A Dive into Earth Baku’s Latest Campaign

Earth Baku has broadened its scope from the Indo-Pacific region to Europe, the Middle East, and Africa. In this blog entry, we examine the threat actor's latest tools, tactics, and procedures.

August 09, 2024
Targeted Attacks

A Dive into Earth Baku’s Latest Campaign

Earth Baku has broadened its scope from the Indo-Pacific region to Europe, the Middle East, and Africa. In this blog entry, we examine the threat actor's latest tools, tactics, and procedures.

Research Aug 09, 2024

Save to Folio

Research Aug 09, 2024

Save to Folio

Exploits & Vulnerabilities

Bringing Security Back into Balance

This article by Trend Micro CEO Eva Chen brings focus back to striking the cybersecurity strategies balance between business C-suite and information technology (IT) departments.

Expert Perspective Aug 04, 2024

Save to Folio

Expert Perspective Aug 04, 2024

Save to Folio

Privacy & Risks

Cybersecurity Compass: An Integrated Cyber Defence Strategy

Explore how the Cybersecurity Compass can guide various security professionals' and stakeholders' decision-making before, during, and after a breach.

Security Strategies Aug 02, 2024

Save to Folio

Security Strategies Aug 02, 2024

Save to Folio

Artificial Intelligence (AI)

AI Pulse: Brazil Gets Bold with Meta, Interpol’s Red Flag & more

The second edition of AI Pulse is all about AI regulation: what’s coming, why it matters, and what might happen without it. We look at Brazil’s hard não to Meta, how communities are pushing back against AI training data use, Interpol’s warnings about AI deepfakes, and more.

Security Strategies Jul 30, 2024

Save to Folio

Security Strategies Jul 30, 2024

Save to Folio

Artificial Intelligence (AI)

AI-Powered Deepfake Tools Becoming More Accessible Than Ever

Trend Micro research uncovers new cybercrime tools posing increased threats to security, highlighting the rapid evolution of AI-powered hacking services and their potential for mass exploitation

Research Jul 30, 2024

Save to Folio

Research Jul 30, 2024

Save to Folio

Artificial Intelligence (AI)

How to Write a Generative AI Cybersecurity Policy

It’s clear that generative AI is a permanent addition to the enterprise IT toolbox. For CISOs, the pressure is on to roll out AI security policies and technologies that can mitigate very real and present risks.

Security Strategies Jul 29, 2024

Save to Folio

Security Strategies Jul 29, 2024

Save to Folio

Phishing

QR Codes: Convenience or Cyberthreat?

Security awareness and measures to detect and prevent sophisticated risks associated with QR code-based phishing attacks (quishing)

Security Strategies Jul 23, 2024

Save to Folio

Security Strategies Jul 23, 2024

Save to Folio

Cyber Threats

Why NDR is Key to Cyber 'Pest Control'

Intruders are drawn to enterprise IT environments the way mice are attracted to houses. And once either kind of invader is inside, they can be hard to get out. Network detection and response (NDR) lets you trace intruders’ pathways to find out where they’re coming in—and seal the gaps.

Security Strategies Jul 22, 2024

Save to Folio

Security Strategies Jul 22, 2024

Save to Folio

Compliance & Risks

Trend Experts Weigh in on Global IT Outage Caused by CrowdStrike

On July 19, 2024, a large-scale outage emerged affecting Windows computers for many industries across the globe from financial institutions to hospitals to airlines. The source of this outage came from a single content update from CrowdStrike.

Expert Perspective Jul 19, 2024

Save to Folio

Expert Perspective Jul 19, 2024

Save to Folio