Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Trend Micro

Below you will find reports with the source of “Trend Micro”

image from Trend Micro Security Predictions for 2024

Trend Micro Security Predictions for 2024

2024 is poised to be a hotbed for new challenges in cybersecurity. As both economic and political terrains continue to undergo digitization, enterprises will increasingly leverage artificial intelligence and machine learning (AI/ML), the cloud, and Web3 technologies. While these innovations are expected to lend a hand to organizations, they also provide opportunities for cybercriminals by promising big returns, more streamlined operations on wider impact zones, and more targeted victims. In this report, we detail the focal points of next year’s threat landscape, along with insights and recommended mitigation measures from our team of cybersecurity experts that are designed to guide decision-makers toward well-informed choices.

(more available)
Added: February 7, 2024
image from Securing Smart Factories

Securing Smart Factories

A look at the unique threat and risk landscape of the manufacturing industry. Discussing the challenges brought about by Industry 4.0, and recommends measures and best practices for securely reaping the benefits of connected production. We also reiterate that securing the manufacturing industry requires regular risk assessments and a resilient cybersecurity framework that is able to detect, respond to, and protect against a variety of security holes.

(more available)
Added: May 18, 2020
image from Trend Micro Cloud App Security Report 2019

Trend Micro Cloud App Security Report 2019

Trend Micro looks into the email security threat landscape, looking into threat types, number of threats, etc.

Added: May 18, 2020
image from Mapping The Future: Trend Micro Security Predictions For 2019

Mapping The Future: Trend Micro Security Predictions For 2019

From the report, “In 2019 and beyond, the biggest trends expected to have an impact on technology and security are the advances in artificial intelligence and machine learning brought about by the ever-growing volume of data that can be processed and analyzed; the continued adoption of cloud computing by enterprises the world over; and the developments in smart devices, homes, and factories — to say nothing of the looming 2020 rollout of 5G, the latest phase of mobile communications geared toward further increasing internet speeds. Furthermore, 2019 will be an important year for political developments including the finalization of Brexit and the holding of landmark elections in several countries. These technological and sociopolitical changes will have a direct impact on security issues in 2019.”

(more available)
Added: January 15, 2019
image from Ransomware: Past, Present and Future

Ransomware: Past, Present and Future

This paper details the history and abilities of Ransomware, and where it is headed in the coming years.

Added: October 25, 2018
image from 2017 Midyear Security Roundup: The Cost Of Compromise

2017 Midyear Security Roundup: The Cost Of Compromise

This report reviews the cyber security threats that occurred in the first half of 2017.

Added: October 23, 2018
image from Leaking Beeps: Unencrypted Pager Messages In The Healthcare Industry

Leaking Beeps: Unencrypted Pager Messages In The Healthcare Industry

Though the mobile phone has overtaken society, some industries still rely on the old pager technology. This paper takes a look at the security risks that come with using that old technology.

(more available)
Added: October 22, 2018
image from Hacker Machine Interface: The State Of SCADA HMI Vulnerabilities

Hacker Machine Interface: The State Of SCADA HMI Vulnerabilities

The Stuxnet and Ukranian power grid attacks give us clear ideas about how much damage a determined adversary can inflict not only on the business or operation concerned, but also on the general public. This paper takes a look at critical infrastructure attacks.

(more available)
Added: October 21, 2018
image from How Cybercriminals Can Abuse Chat Platform API's As C&C Infrastructures

How Cybercriminals Can Abuse Chat Platform API's As C&C Infrastructures

This paper presents exclusive research into how chat platforms can be abused and become a cyber security weakness.

Added: October 21, 2018
image from German Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In German Cities

German Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In German Cities

This paper takes a look at the cities of Germany, and the cyber threats that occurred there.

Added: October 20, 2018
image from Western European Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In Western Cities

Western European Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In Western Cities

This paper takes a look at the cities of the west, and the cyber threats that occurred there.

Added: October 20, 2018
image from French Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In French Cities

French Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In French Cities

This paper takes a look at the cities of France, and the cyber threats that occurred there.

Added: October 19, 2018
image from US Cities Exposed: A Shodan-based Security Study On Exposed Assets In Cities In The US

US Cities Exposed: A Shodan-based Security Study On Exposed Assets In Cities In The US

This paper takes a look at the cities of the US, and the cyber threats that occurred there.

Added: October 19, 2018
image from Espionage As A Service

Espionage As A Service

This brief takes a look at the espionage as a service industry and how it can help businesses become secure.

(more available)
Added: October 18, 2018
image from UK Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In The UK

UK Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In The UK

This paper takes a look at the cities of the United Kingdom, and the cyber threats that occurred there.

Added: October 18, 2018
image from Two Years Of Pawn Storm: Examining An Increasingly Relevant Threat

Two Years Of Pawn Storm: Examining An Increasingly Relevant Threat

This paper is exclusively dedicated to the cyber threat, Pawn Storm.

Added: October 17, 2018
image from Cybercrime And Other Threats Faced By The Healthcare Industry

Cybercrime And Other Threats Faced By The Healthcare Industry

In this paper they discuss several aspects of the healthcare threat surface.

Added: October 16, 2018
image from Tracking Trends In Business Email Compromise

Tracking Trends In Business Email Compromise

This report takes a look at Business Email Compromise attacks and examines why the FBI was able to report that it has become a billion dollar industry.

(more available)
Added: October 16, 2018
image from The Rise And Fall OF Scan4You

The Rise And Fall OF Scan4You

This is exclusive research into the cyber threat that is Scan4You. It discusses the history and current outcomes of this unique threat.

(more available)
Added: October 15, 2018
image from Annual Security Roundup: The Paradox Of Cyberthreats

Annual Security Roundup: The Paradox Of Cyberthreats

This report reviews the significant cyber events of 2017, and discusses the paradox that occurred.

Added: October 14, 2018
image from The French Underground: Under A Shroud Of Extreme Caution

The French Underground: Under A Shroud Of Extreme Caution

If the North American underground had an alter ego, it would be the French underground. A deep dive into the North American underground1 revealed that it is a “glass tank,” open to not only the tech-savviest of hackers, but also visible to both cybercriminals and law enforcement. The French underground, meanwhile, is not only well-hidden in the Dark Web, its players also operate with extreme caution. Read this paper to find out more.

(more available)
Added: October 13, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 00:08 UTC (build b1d7be4)