The continuing threat of POS malware
Point-of-sale systems have seen numerous changes in recent years. From the shift to chip-card readers and the inclusion of new technology for contactless mobile payments, POS systems aren't just for...
View ArticleHow organizations can protect against new CERBER variations
TrendMicro Ransomware hit hard in 2016, with big attacks, large payouts and many new strains developed to thwart security measures. At the end of last year, Locky and CERBER ransomware families seemed...
View ArticleIndustrial Robots are Hackable: How Do We Fix Them?
Discuss cyber attacks involving robots and many people might think you’re talking about the latest Hollywood blockbuster to hit the screens. The reality, however, is that industrial robotic systems now...
View ArticleOAuth Phishing On The Rise
Recently there was a significant volume of new phishing emails aimed at capturing access to Google accounts…specifically your email and contacts. You can read more about it at The Verge, Quartz, and...
View ArticleTrend Micro Smart Protection Complete Receives 5-Star Review from SC Magazine
The best days are the ones you wake up to good news you weren’t expecting, right? Well, earlier this month we woke up to find out the Trend Micro Smart Protection Complete had received a five-star...
View ArticleLeading by Example at the HITRUST Annual Healthcare Cybersecurity Conference
If we’ve learned anything from the past year in cybersecurity, it’s that cybercriminals do not discriminate when it comes to their victims. Hospital systems have been forced to shut down for crucial...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of May 1, 2017
As you read this blog, I am probably sitting on a beach in Cancun, Mexico getting a nice tan and not thinking about security (well, maybe just a little). A couple of days before I left, I had to deal...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleThe Unified Cloud
Throughout the history of cloud computing, 2006 was a momentous year. In 2006 Amazon Web Services released S3, the first pay per GB storage service. By August, they released EC2, allowing you to spin...
View ArticlePawn Storm – A Look Into this Cyberespionage Actor Group
In April 2017 my monthly threat webinar focused on a cyberespionage group our Forward-Looking Threat Researcher, Feike Hacquebord, has been following for many years and recently published a report into...
View ArticleRandstad Group Selects Trend Micro to Protect its Public Cloud Infrastructure
The Randstad Group is currently in the process of consolidating and centralizing its IT infrastructure across 30 IT departments, and will be providing service to more than 40 operating countries across...
View ArticleTransforming the Cyber Health of Small HCOs Across the US
When we talk about healthcare breaches, there are some big-name incidents. Yet in reality there’s a huge number of smaller providers who are in the hackers’ sights and maybe don’t have the resources or...
View ArticleAccelerating AI Research to Improve Threat Protection
Once the realm of science fiction, artificial intelligence (AI) is now very much science fact. The potential of this ground-breaking technology – and related disciplines including deep learning and...
View ArticleTeaming Up with HITRUST to Raise Cybersecurity Standards in Healthcare
From cash-hungry hackers to state-sponsored spies and careless insiders, there’s no shortage of cyber threats facing healthcare organizations (HCOs) today. At Trend Micro, we’ve been protecting...
View ArticleIs Your Security Team Setup To Fail?
The ingredients for strong cybersecurity aren’t a secret. In fact, they haven’t changed significantly over the past 20 years—the ingredients are available to almost every organization out there. On the...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of May 8, 2017
Although I’m still dreaming of the sandy beaches of Cancun, it’s time to get back to reality. Security vulnerabilities never take a holiday and this week is no exception. In addition to our normal...
View ArticleWannaCry & The Reality Of Patching
[Editors note: For the latest WannaCry information as it relates to Trend Micro products, please read this support article.] The WannaCry ransomware variant of 12-May-2017 has been engineered to take...
View ArticleWannaCry and the Executive Order
Last week, The White House released its long awaited Executive Order (EO), Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, ironically enough during the same week we...
View ArticleWhy “Just Patch It!” Isn’t as Easy as You Think
At the Zero Day Initiative (ZDI), we see patches in a way few do. We get the initial report from a researcher, we verify the issue internally, we notify the vendor, and finally we publish some details...
View Article