Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

trendmicro.com

Trend Micro Simply Security

Get the latest updates from Trend Micro Simply Security directly as they happen.

Follow now 245 followers

Latest posts

Last updated 1 day ago

An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via ‘Cracked’ Apps

2 days ago

Trend™ Research analyzed a campaign distributing Atomic macOS Stealer (AMOS), a malware...

Operation Serengeti 2.0: Trend Micro Helps Law Enforcement Fight Cybercrime in Africa

8 days ago

Operation Serengeti 2.0: With Trend Micro’s support, INTERPOL led a major crackdown...

TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents

9 days ago

The TAOTH campaign exploited abandoned software and spear-phishing to deploy multiple malware...

Trend Vision One Integrates Microsoft Defender for Endpoint

11 days ago

Discover how Trend Vision One integrates with Microsoft Defender for Endpoint to...

Leadership, Innovation, and the Future of AI: Lessons from Trend Micro CEO & Co-Founder Eva Chen

15 days ago

Discover how AI is reshaping cybersecurity through our CEO, Eva Chen’s industry...

Warlock: From SharePoint Vulnerability Exploit to Enterprise Ransomware

17 days ago

Warlock ransomware exploits unpatched Microsoft SharePoint vulnerabilities to gain access, escalate privileges...

Crypto24 Ransomware Group Blends Legitimate Tools with Custom Malware for Stealth Attacks

23 days ago

Crypto24 is a ransomware group that stealthily blends legitimate tools with custom...

New Ransomware Charon Uses Earth Baxia APT Techniques To Target Enterprises

25 days ago

We uncovered Charon, a new ransomware strainfamily that uses advanced APT-style techniques...

New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises

25 days ago

We uncovered Charon, a new ransomware strainfamily that uses advanced APT-style techniques...

Gunra Ransomware Group Unveils Efficient Linux Variant

about 1 month ago

This blog discusses how Gunra ransomware’s new Linux variant accelerates and customizes...

Unlocking the Power of Amazon Security Lake for Proactive Security

about 1 month ago

Security is a central challenge in modern application development and maintenance, requiring...

Revisiting UNC3886 Tactics to Defend Against Present Risk

about 1 month ago

We examine the past tactics used by UNC3886 to gain insight on...