Ransomware: What Are the Bad Guys After and How Do I Stop Them?
If the past few days of WannaCry ransomware activity have taught us anything it’s that cybercriminals pose a clear and present danger to organizations and their customers all over the world. But have...
View ArticleProtecting Your Small Business From WannaCry
May 12, 2017 saw the world’s first ever worm-based ransomware attack, WannaCry. Typically ransomware spreads via email as spam and phishing attacks, and relies on human intervention to initiate the...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of May 15, 2017
“Are you crying? ARE YOU CRYING? There’s no crying! THERE’S NO CRYING IN BASEBALL!” Those famous words from Jimmy Dugan (portrayed by Tom Hanks) in the 1992 movie A League of their Own, ring true in...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleChallenges with Critical Infrastructure: IoT, Smart Cities Under Attack
Internet of Things technology is now more widespread than many people realize. Systems that fall under the IoT umbrella are popping up in an array of settings, even outside consumer circles. Today,...
View ArticleThe Latest on WannaCry, UIWIX, EternalRocks and ShadowBrokers
Ransomware has gained global attention over the course of the last two weeks due to the huge spread of WannaCry. Following the initial attacks, we’ve seen UIWIX, Adylkuzz and now EternalRocks come onto...
View ArticleWannaCry Highlights Major Security Shortcomings Ahead of GDPR D-Day
For all the panic it caused, WannaCry looks finally to have been contained by organisations round the globe. But this isn’t the time to forget about it and move on. There are valuable lessons to be...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of May 22, 2017
For those of you who follow the National Football League (NFL), do you remember Super Bowl 47? I wasn’t exactly thrilled about the teams that played since I’m not a 49ers or Ravens fan. What was...
View ArticleThe Jetson’s Cyber Concerns – Future Smart Cities Cybersecurity Checklist
As cities continue to grow smarter, they will also become easier to hack. With millions (if not billions) of dollars going into research for urban domains and the Internet of Things (IoT), there will...
View ArticleDecade Long Partnership = Global Partner Innovation Award
Here at Trend Micro we highly value the relationships we’ve build with our partners, especially those that have spanned several years. However, it’s particularly gratifying when those partners choose...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of May 29, 2017
“Anything that can go wrong will go wrong.” It’s not exactly clear how Murphy’s Law originated, but it seems to always make an appearance at the one time you can’t afford for anything to go wrong. Your...
View ArticleBridging the Skills Gap with Trend Micro’s Capture the Flag (CTF) Competition
We all know the IT security industry is suffering from chronic skills gaps and shortages around the world. In the US things are no different, with an estimated talent shortfall of around 40,000 jobs...
View ArticleHow vulnerability research benefits both vendors and customers
Zero-day vulnerabilities – newly discovered exploits that haven’t been previously identified – are now emerging more often. Worse still is the fact that these dangerous flaws sometimes aren’t...
View ArticleHow IOC Sharing Will Help Us Build a More Secure Healthcare Sector
At Trend Micro we work hard every day to reduce the risk posed by cyber attacks from hacktavists, transnational cybercriminals, and cyber espionage groups. Nowhere is this more pertinent than in the...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of June 5, 2017
This week marked the first time an airline misplaced my bags for a significant period of time. Inclement weather forced me to not only change my flight, but also change airlines. Unfortunately, my...
View ArticleFlying Under the Radar: How Hackers Use Protection Strategies for Attack
It's a recurring theme in sports movies, war stories and crime stories alike: In order to defeat the enemy, one must think like the enemy. This approach has been taken – oftentimes quite successfully...
View ArticleBusiness Process Compromise: The Next Step in Advanced Targeted Attacks
Targeted attacks have come a long way in recent years, leveraging increasingly advanced techniques aimed at specific individuals. Often, these hackers pinpoint a single person within an enterprise,...
View Article