Cyber Risk Management: Bring Security to the Boardroom
Credit to Author: Fernando Cardoso| Date: Wed, 14 Feb 2024 00:00:00 +0000
Discover how to strategically present security controls to the board to better manage cyber risk.
Read moreCredit to Author: Fernando Cardoso| Date: Wed, 14 Feb 2024 00:00:00 +0000
Discover how to strategically present security controls to the board to better manage cyber risk.
Read moreCredit to Author: David Chow| Date: Tue, 13 Feb 2024 00:00:00 +0000
Trend Micro’s Chief Technology Strategy Officer discusses the biggest cybersecurity trends and what to watch for in 2024.
Read moreCredit to Author: Trend Micro Research| Date: Tue, 13 Feb 2024 00:00:00 +0000
This entry aims to provide additional context to CVE-2024-21412, how it can be used by threat actors, and how Trend protects customers from this specific vulnerability.
Read moreCredit to Author: Peter Girnus| Date: Tue, 13 Feb 2024 00:00:00 +0000
The APT group Water Hydra has been exploiting the zero-day Microsoft Defender SmartScreen vulnerability (CVE-2024-21412) in its campaigns targeting financial market traders. This vulnerability, which has now been patched by Microsoft, was discovered and disclosed by the Trend Micro Zero Day Initiative.
Read moreCredit to Author: Shannon Murphy| Date: Thu, 08 Feb 2024 00:00:00 +0000
After a full year of life with ChatGPT cybersecurity experts have a clearer sense of how criminals are using generative AI to enhance attacks – learn what generative AI means for cybersecurity in 2024.
Read moreCredit to Author: Shannon Murphy| Date: Wed, 07 Feb 2024 00:00:00 +0000
A finance worker in Hong Kong was tricked by a deepfake video conference. The future of defending against deepfakes is as much as human challenge as a technological one.
Read moreCredit to Author: Jagir Shastri| Date: Wed, 07 Feb 2024 00:00:00 +0000
In this blog entry, we discuss CVE-2023-22527, a vulnerability in Atlassian Confluence that has a CVSS score of 10 and could allow threat actors to perform remote code execution.
Read moreCredit to Author: Alifiya Sadikali| Date: Tue, 06 Feb 2024 00:00:00 +0000
Attacks don’t stay in siloes, and neither should your security solutions. Explore the benefits of a cybersecurity platform that consolidates security across multiple layers—including the cloud—for more proactive risk management.
Read more