Research and Analysis

Dark Motives Online: An Analysis of Overlapping Technologies Used by Cybercriminals and Terrorist Organizations

Research on the common technologies used by cybercriminals and terrorists to benefit their cause, from the services they abuse to the tools they’ve homebrewed to streamline activities.

Read more

Keeping abreast of today’s threat landscape is non-negotiable. Enterprises, service providers, and the Internet-at-large would benefit in knowing the latest in technology and threats so they can actively secure their data and systems against compromise. Skimming security news provides a high-level idea of what’s going on in the real world, but to build effective security strategies, organizations and individuals need to get a better look of what goes on beyond the surface.

Research

Access research papers and articles by our security experts and analysts
Read more


Latest updates

Dark Motives Online: An Analysis of Overlapping Technologies Used by Cybercriminals and Terrorist Organizations

Research on the common technologies used by cybercriminals and terrorists to benefit their cause, from the services they abuse to the tools they’ve homebrewed to streamline activities.
Read more

    Threat Reports

    Download our latest TrendLabs Security Roundups
    Read more


    Latest updates

    Setting the Stage: Landscape Shifts Dictate Future Threat Response Strategies

    2015 laid the groundwork for what we can now consider the new status quo in cybersecurity. Will current security strategies hold against this existing paradigm or will organizations need to consider a change?
    Read more

      Download our latest TrendLabs Security Predictions
      Read more

      Latest updates

      2016 Security Predictions: The Fine Line

      From new extortion schemes and IoT threats to improved cybercrime legislation, Trend Micro predicts how the security landscape is going to look like in 2016.
      Read more

        Social Media

        Connect with us on