Trend Micro
Trend Micro launches managed detection and response service
Trend Micro announced the Trend Micro Managed Detection and Response (MDR) service. In addition, multiple new AI-powered capabilities are being embedded across the entire …
Trend Micro expands its security solution for containers
Trend Micro has announced the expansion of its security solution for containers with Deep Security Smart Check. This component provides continuous container image scanning to …
Overview: Microsoft June 2018 Patch Tuesday
It’s that time of the month again when Microsoft releases patches for its software. The June 2018 updates fix 50 vulnerabilities, 12 of which are critical. The company …
Apple device users, stay away from QR codes until you upgrade
It’s time to update your Mac and iOS-powered devices again: Apple has plugged four vulnerabilities, two of which could be exploited to execute arbitrary code if a user …
What patches to prioritize following the April 2018 Patch Tuesday?
Patch Tuesday came and went and, as usual, Microsoft and Adobe have released patches/security updates for vulnerabilities affecting a wide variety of their products. …
How to minimize healthcare supply chain threats
There are many reasons why healthcare institutions have poor cybersecurity: most resources go towards providing patient care and not enough is left for cybersecurity; not all …
Trend Micro fixes serious vulnerabilities in Email Encryption Gateway
Trend Micro has plugged a bucketload of vulnerabilities in its Email Encryption Gateway, some of which can be combined to execute root commands from the perspective of a …
The advent of GDPR could fuel extortion attempts by criminals
The number of exploit kit attacks is, slowly but surely, going down, and malware peddlers are turning towards more reliable tactics such as spam, phishing, and targeting …
Microsoft, Adobe February 2018 security updates: An overview
The Microsoft February 2018 security updates are for Internet Explorer, Edge, Windows, Office, Office Services and Web Apps, Adobe Flash, and ChakraCore (the core part of the …
How to prepare for the future of digital extortion
Digital extortion has evolved into the most successful criminal business model in the current threat landscape, and Trend Micro researchers predict that it will continue to …
How cybercriminals abuse the travel and hospitality industry
The travel and hospitality industry suffers billions of losses each year due to fraud. “With the right combination of other underground services (compromised accounts, …
Are your connected devices searchable on the Internet?
Despite being a hub for technology talent, Berliners are leaving themselves wide open to cyberattack through poor security practices that are exposing millions of cyber …
Featured news
Sponsored
Don't miss
- How attackers deliver malware to Foxit PDF Reader users
- Core security measures to strengthen privacy and data protection programs
- Ransomware statistics that reveal alarming rate of cyber extortion
- Key questions to ask when tailoring defensive stacks
- May 2024 Patch Tuesday: Microsoft fixes exploited zero-days (CVE-2024-30051, CVE-2024-30040)