Trend Micro – Trend Micro – Detect Azure AD Hybrid Cloud Vulnerabilities Workload Security AADInternals is a PowerShell module widely used by administrators for administering Azure Active Directory (AD) and…
Category: Trend Micro DevOps : How To
Mitigate Top 5 Common Cybersecurity Vulnerabilities
Trend Micro – Trend Micro – Vulnerabilities in software and infrastructure are a fact of life for developers and SREs, but that doesn’t mean you must accept them. Given the…
How to Secure AWS Serverless API(s)
Trend Micro – Trend Micro – How to Secure AWS Serverless API(s) Network Security Discover how to easily enhance security of your container-based AWS serverless API to protect against known…
How to detect Apache Log4j vulnerabilities
Trend Micro – Trend Micro – How to Detect Apache Log4j Vulnerabilities Network Security Explore how to detect Apache Log4j (Log4Shell) vulnerabilities using cloud-native security tools. By: Nitesh Surana January…
How to detect Apache HTTP Server Exploitation
Trend Micro – Trend Micro – In the above two requests and responses, we see the attacker fingerprinting vulnerable servers by running the ‘echo’ command. We observed successful exploitation attempts…
Oracle WebLogic Detection and Mitigation
Trend Micro – Trend Micro – Detection and Remediation Now that we’ve covered the vulnerabilities, let’s get into how we can detect and mitigate these critical flaws using a SaaS…
Demo: A Guide to Virtual Machine App Security
Trend Micro – Trend Micro – It may seem like containers are the go-to method for cloud building, however 95% applications run on traditional infrastructure deployments like dedicated servers, shared…