October 2016 – A brave new world of security updates
Welcome to the first Trend Micro Zero Day Initiative (ZDI) monthly patch review blog. This month, we put additional context around the major security patches released from Microsoft and Adobe. As the...
View ArticleExploits as a Service: How the Exploit Kit + Ransomware Tandem Affects a...
Blackhole Exploit Kit introduced the lucrative but hazardous exploit-kit-ransomware combo with CryptoLocker back in 2013. Soon after, other exploit kits, like Angler, Neutrino, Magnitude, and Rig,...
View ArticleTrend Micro’s Latest Legal Victory is a Win for the Real Innovators
At Trend Micro we’ve been protecting businesses, consumers and governments from cyber threats for more than 27 years now. Our success over this time has been built on our passion to make the world...
View ArticleTalking about Ransomware, A Recap
Our recent #trendsider twitter chat focused on ransomware. If you haven’t heard about ransomware yet, the odds are good that you will soon. This is major growth area for cybercriminals. Ransomware...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of October 10,...
I was in Miami, Florida this week meeting with our TippingPoint sales team. We stayed at a property that is owned by a certain U.S. presidential candidate. On our last night there, we get back from...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTrend Micro Achieves “Recommended” Status from NSS Labs Testing
Once again, we at Trend Micro have proven ourselves to be worthy opponents amongst our competitors in the realm of security and network defense. Our latest victory shines the spotlight on Trend Micro...
View ArticleRaising the bar with XGen™ Endpoint Security – Protection Exactly When and...
IT security managers are faced with a series of challenges: increasingly sophisticated threats, riskier user behavior and a lack of visibility across their different security systems. At Trend Micro,...
View ArticleTrend Micro Endpoint Security Named A Leader in New Forrester Report
Ransomware, targeted attacks, zero day threats, information stealing malware – modern CISOs face a formidable array of threats today. Just last month the FBI was forced to issue yet another warning on...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of October 17,...
Our Zero Day Initiative team is really busy this time of the year. In addition to their participation at the upcoming Ruxcon conference, they will also be hosting the 2016 Mobile Pwn2Own competition at...
View ArticleUse of Pagers in ICS Pose Challenges
In a follow-on report to our recent one involving the use of pagers in healthcare, Trend Micro Forward-Looking Research (FTR) team also analyzed the use of pager communications in industrial...
View Article6 Scariest Faces of Ransomware
This time of year is full of thrills and chills, but no online threat is quite as scary as ransomware. While it comes in many forms, the overall gist is that ransomware locks files on a computer and...
View ArticleWelcome to Mobile Pwn2Own 2016
Greetings from Tokyo where the 2016 Mobile Pwn2Own competition has begun! For this year’s edition, two separate contestants registered to target five specific targets through the day. We’ve also chosen...
View ArticleRisk and Reward of Alternative Payment Systems
The explosive growth of alternative payment systems (APS) globally has posed great opportunities for businesses and consumers alike but equally has posed significant challenges for international law...
View ArticleThe Results are In: Mobile Pwn2Own 2016
The 2016 edition of Mobile Pwn2Own has wrapped, and the contestants demonstrated some unique attacks against the iPhone 6S and Nexus 6P. By the end of the day, researchers showed how phones – even...
View ArticleTippingPoint DVLabs Provides Exclusive Security Coverage for Mobile Pwn2Own...
Welcome back to Mobile Pwn2Own 2016, from the PacSecWest security conference in Tokyo, Japan! This year’s contest featured two competitor teams; Tencent Keen Security Lab and MWR Labs. Ultimately,...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of October 24,...
Earlier this week, the Zero Day Initiative (ZDI) hosted the 2016 Mobile Pwn2Own contest in Tokyo during the PacSec conference. This year’s contest saw unique attacks against the iPhone 6S and Nexus 6P....
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleEvolution of Securing VMware Environments
Trend Micro has a long history of providing organizations with advanced server security for physical, virtual, and cloud environments. We protect enterprise applications and data from ransomware,...
View Article