How to Secure AWS Serverless API(s)

Trend Micro – Trend Micro – How to Secure AWS Serverless API(s) Network Security Discover how to easily enhance security of your container-based AWS serverless API to protect against known…

How to detect Apache Log4j vulnerabilities

Trend Micro – Trend Micro – How to Detect Apache Log4j Vulnerabilities Network Security Explore how to detect Apache Log4j (Log4Shell) vulnerabilities using cloud-native security tools. By: Nitesh Surana January…

How to detect Apache HTTP Server Exploitation

Trend Micro – Trend Micro – In the above two requests and responses, we see the attacker fingerprinting vulnerable servers by running the ‘echo’ command. We observed successful exploitation attempts…

Oracle WebLogic Detection and Mitigation

Trend Micro – Trend Micro – Detection and Remediation Now that we’ve covered the vulnerabilities, let’s get into how we can detect and mitigate these critical flaws using a SaaS…

Virtual Patching 101

Trend Micro – Trend Micro – Virtual Patching 101 Network Security Get the lowdown on virtual patching: a simplified, automated solution to shielding vulnerabilities from exploits. By: Trend Micro December…

Leverage Virtual Patching to Prevent Network Threats

Trend Micro – Trend Micro – Understanding IPS Patching An intrusion prevention system (IPS) acts as a security mechanism to detect and prevent network threats. The system accomplishes this by…