Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
A Dive into Earth Baku’s Latest Campaign
APT & Targeted Attacks

A Dive into Earth Baku’s Latest Campaign

Earth Baku has broadened its scope from the Indo-Pacific region to Europe, the Middle East, and Africa. In this blog entry, we examine the threat actor's latest tools, tactics, and procedures.

August 09, 2024
APT & Targeted Attacks

A Dive into Earth Baku’s Latest Campaign

Earth Baku has broadened its scope from the Indo-Pacific region to Europe, the Middle East, and Africa. In this blog entry, we examine the threat actor's latest tools, tactics, and procedures.

Research Aug 09, 2024

Save to Folio

Research Aug 09, 2024

Save to Folio

Exploits & Vulnerabilities

Bringing Security Back into Balance

This article by Trend Micro CEO Eva Chen brings focus back to striking the cybersecurity strategies balance between business C-suite and information technology (IT) departments.

Expert Perspective Aug 04, 2024

Save to Folio

Expert Perspective Aug 04, 2024

Save to Folio

Privacy & Risks

Cybersecurity Compass: An Integrated Cyber Defence Strategy

Explore how the Cybersecurity Compass can guide various security professionals' and stakeholders' decision-making before, during, and after a breach.

Security Strategies Aug 02, 2024

Save to Folio

Security Strategies Aug 02, 2024

Save to Folio

Artificial Intelligence (AI)

AI Pulse: Brazil Gets Bold with Meta, Interpol’s Red Flag & more

The second edition of AI Pulse is all about AI regulation: what’s coming, why it matters, and what might happen without it. We look at Brazil’s hard não to Meta, how communities are pushing back against AI training data use, Interpol’s warnings about AI deepfakes, and more.

Security Strategies Jul 30, 2024

Save to Folio

Security Strategies Jul 30, 2024

Save to Folio

Artificial Intelligence (AI)

AI-Powered Deepfake Tools Becoming More Accessible Than Ever

Trend Micro research uncovers new cybercrime tools posing increased threats to security, highlighting the rapid evolution of AI-powered hacking services and their potential for mass exploitation

Research Jul 30, 2024

Save to Folio

Research Jul 30, 2024

Save to Folio

Artificial Intelligence (AI)

How to Write a Generative AI Cybersecurity Policy

It’s clear that generative AI is a permanent addition to the enterprise IT toolbox. For CISOs, the pressure is on to roll out AI security policies and technologies that can mitigate very real and present risks.

Security Strategies Jul 29, 2024

Save to Folio

Security Strategies Jul 29, 2024

Save to Folio

Artificial Intelligence (AI)

GenAI-Powered Phishing Threats Call for New Training

Driven by a growing digital economy and rapid digital penetration, cybercriminals are going on phishing trips in Southeast Asia with increasing frequency.

Expert Perspective Jul 24, 2024

Save to Folio

Expert Perspective Jul 24, 2024

Save to Folio

Phishing

QR Codes: Convenience or Cyberthreat?

Security awareness and measures to detect and prevent sophisticated risks associated with QR code-based phishing attacks (quishing)

Security Strategies Jul 23, 2024

Save to Folio

Security Strategies Jul 23, 2024

Save to Folio

Cyber Threats

Why NDR is Key to Cyber 'Pest Control'

Intruders are drawn to enterprise IT environments the way mice are attracted to houses. And once either kind of invader is inside, they can be hard to get out. Network detection and response (NDR) lets you trace intruders’ pathways to find out where they’re coming in—and seal the gaps.

Security Strategies Jul 22, 2024

Save to Folio

Security Strategies Jul 22, 2024

Save to Folio