News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Welcome to the Trend Micro Partner Channel

In the partner channel you will find all articles, news and white papers published by Trend Micro sorted by date.

Trend Micro, one of the world's leading cyber security providers, is helping to create a secure world for digital data exchange. Backed by decades of security expertise, global threat research, and constant innovation, our unified cybersecurity platform protects hundreds of thousands of businesses and millions of people across clouds, networks, devices, and endpoints.

Read more

Agent-based cybersecurity with an open source model
Agent-based cybersecurity with open-source model - Image: Bing - AI

Trend Micro's Trend Cybertron AI agent is being released as an open source model. The AI ​​model and agent framework1 is designed to accelerate the development of autonomous cybersecurity agents. As one of the first specialized cybersecurity Large Language Models (LLM), it provides enterprises and researchers worldwide with free access2 to advanced cybersecurity. Optimized with Llama 3.1, Trend Cybertron supports rapid, reliable deployment with NVIDIA NIM inference microservices on an NVIDIA infrastructure. Predicting and responding to cyber threats: Enterprises worldwide strive to innovate and grow while facing security challenges, fragmented point solutions, and an overwhelming flood of threat alerts. A…

Read more

Proactive cybersecurity AI fends off attacks

Trend Micro's first proactive cybersecurity AI sets a new standard with new capabilities for proactive risk management, threat modeling, attack path prediction, and other insights. Proactive security insights are designed to better protect organizations. The new AI agent is transforming the way organizations address cyber risks. Trend Cybertron is the industry's first specialized cybersecurity large language model (LLM) that delivers proactive security insights. The new AI leverages precise local risk assessments and deep, global, and industry-specific threat intelligence to predict and prevent threats across an organization's entire attack surface in any environment. AI against…

Read more

AI-generated fraud: Preventing deepfakes, AI voices, and fake profiles

AIs generate everything for the user – including a wealth of fraudulent content, such as deepfakes, AI voices, or fake profiles. Users can be perfectly deceived by these technologies – only good systems cannot. Only a combination of measures can counter AI-generated fraud: people, processes, and technology. Since the emergence of generative AI two years ago, it has captured people's imaginations and permeated more and more areas of life – with numerous advantages, of course, but also new risks. Security researchers at Trend Micro still see AI as a key driver of criminal activity in 2025…

Read more

Since 2017: Zero-day exploits in Windows LNK files
Since 2017: Zero-day exploits in Windows LNK files Image: Bing - AI

The Zero Day Initiative (ZDI) has identified ZDI-CAN-25373, a Windows .lnk file vulnerability that has been abused by APT groups with zero-day exploits since 2017. The Zero Day Initiative's threat hunting team has identified nearly 1000 malicious .lnk files that abuse ZDI-CAN-25373, a vulnerability that allows attackers to execute hidden malicious commands on a victim's computer by using crafted shortcut files. The attacks use hidden command-line arguments in .lnk files to execute malicious zero-day exploits. This poses significant risks for organizations of data theft and...

Read more

IT security: pressure to innovate and shortage of skilled workers
IT security: pressure to innovate and shortage of skilled workers Image: Bing - AI

How do pressure to innovate and a shortage of skilled workers affect IT security? In IT security, new young employees often come into contact with long-established employees and sometimes cause a generational conflict. CISOs are therefore faced with new challenges. Companies are dependent on the dynamism and fresh ideas of the younger generation to counter the shortage of skilled workers and to continue to develop. However, this must not come at the expense of IT security. In order to master this balancing act, a security approach is needed that creates space for progress instead of hindering it. IT security must renew itself in order to resolve the generational conflict between the...

Read more

Cybersecurity 2025: Deepfakes, AI-assisted phishing, fraud
Cybersecurity 2025: Deepfakes, AI-powered phishing, fraud Image: Bing - AI

Trend Micro experts warn of an era of hyper-personalized cyberattacks and identity theft in 2025. In their security predictions for the new year, the experts warn of highly individualized, AI-powered fraud, phishing and influence campaigns. The report "The Easy Way In/Out: Securing The Artificial Future" on the predictions for 2025 warns in particular of the potential of malicious "digital twins". Stolen or leaked personal information is used to train a Large Language Model (LLM) that mimics the victim's knowledge, personality and writing style. In combination with fake video and...

Read more

RAG: Innovative AI technologies bring dangers
RAG: Innovative AI technologies bring dangers Image: Bing - AI

Since the launch of ChatGPT 2022, more and more companies want to use AI technologies - often with specific requirements. Retrieval Augmented Generation (RAG) is the preferred technology for developing innovative applications based on private data. But security risks such as unprotected vector storage, faulty data validation and denial-of-service attacks pose a serious threat, especially given the rapid development cycle of RAG systems. The innovative AI technology RAG needs a few ingredients to work: A database of text blocks and a way to retrieve them are required. Typically, a vector store is used for this, which stores the text and a series of…

Read more

Devices and user accounts – this is what cyber attackers are targeting
Devices and user accounts - this is what cyber attackers are targeting Image: Bing -KI

The new Cyber ​​Risk Report shows the critical vulnerabilities in companies and thus also offers new opportunities for risk prioritization. The report provides extensive data broken down by region, company size, industry and asset type. IT security managers are required to gain a better overview of the risks of their attack surface. Using an event catalog, the cybersecurity platform Trend Vision One calculates the individual risk for each asset type as well as a risk index for the entire company by multiplying the attack status, the vulnerability status and the security configuration of an asset by the possible consequences. An asset with low business…

Read more

Danger of fake news for companies and authorities
Danger of fake news for companies and authorities Image: Bing - AI

The actors use fake news to control political issues and decisions and to create fear and mistrust. In doing so, they target organizations as well as companies and authorities. They can protect themselves by developing an awareness of influence and acting proactively. Using targeted fake news to stoke fear and spread uncertainty - this is the goal of influence operations. The data leak from the "Social Design Agency" (SDA), which is close to the Kremlin, shows how extensive such campaigns can be. According to this, the aim is to destabilize Western democracies and spread Russia's narratives. It uses memes, social media posts...

Read more

Only 30 percent have cybersecurity teams available around the clock
Only 30 percent have cybersecurity teams on duty around the clock Image: Bing - AI

Only a third of the companies surveyed have a security team that ensures 24x7x365 cybersecurity. However, the new study also reveals gaps in the resilience and lack of responsibility of the management of many companies. The study results on dealing with cyber risks show that companies lack resources and the willingness of management to identify and minimize their digital attack surface. The current study by Trend Micro, for which IT security decision-makers worldwide were surveyed, shows some widespread weaknesses in the cyber resilience of German companies. Weaknesses in cyber resilience Only 33 percent of the German companies surveyed…

Read more