QR Codes: Convenience or Cyberthreat?
Credit to Author: Sara Atie| Date: Tue, 23 Jul 2024 00:00:00 +0000
Security awareness and measures to detect and prevent sophisticated risks associated with QR code-based phishing attacks (quishing)
Read moreCredit to Author: Sara Atie| Date: Tue, 23 Jul 2024 00:00:00 +0000
Security awareness and measures to detect and prevent sophisticated risks associated with QR code-based phishing attacks (quishing)
Read moreCredit to Author: Trend Micro Research| Date: Tue, 09 Jul 2024 00:00:00 +0000
Cybersecurity teams are well-equipped to handle threats to technology assets that they manage. But with unmanaged devices providing ideal spots for attackers to lurk unseen, network detection and response capabilities have become vitally important.
Read moreCredit to Author: Trend Micro Research| Date: Tue, 09 Jul 2024 00:00:00 +0000
Cybersecurity teams are well-equipped to handle threats to technology assets that they manage. But with unmanaged devices providing ideal spots for attackers to lurk unseen, network detection and response capabilities have become vitally important.
Read moreCredit to Author: Johnny Krogsboll| Date: Thu, 11 Apr 2024 00:00:00 +0000
Delve into the world of red team exercises, their vital role in enhancing organizational security through simulated cyberattacks, including tactics like phishing and lateral movement within networks, and understand the need for regular testing and improvement to counter evolving threats effectively.
Read moreCredit to Author: Lonny Huffar| Date: Thu, 11 Apr 2024 00:00:00 +0000
Discover how Trend is strengthening its endpoint solutions to detect fileless attacks earlier. By leveraging Intel Threat Detection Technology, Trend enhances the scalability and resiliency of its solutions.
Read moreCredit to Author: Fernando Cardoso| Date: Wed, 03 Apr 2024 00:00:00 +0000
Explore how a cybersecurity platform with attack surface management and runtime protection capabilities can enhance your cloud security posture.
Read moreCredit to Author: Alifiya Sadikali| Date: Tue, 06 Feb 2024 00:00:00 +0000
Attacks don’t stay in siloes, and neither should your security solutions. Explore the benefits of a cybersecurity platform that consolidates security across multiple layers—including the cloud—for more proactive risk management.
Read moreCredit to Author: Ed Cabrera| Date: Fri, 08 Sep 2023 00:00:00 +0000
Discover what the increased regulatory risk due to recent US and UK sanctions imposed on TrickBot and Conti cybercriminals mean for CISOs and board members.
Read more