Detect Azure AD Hybrid Cloud Vulnerabilities

Trend Micro – Trend Micro – Detect Azure AD Hybrid Cloud Vulnerabilities Workload Security AADInternals is a PowerShell module widely used by administrators for administering Azure Active Directory (AD) and…

Mitigate Top 5 Common Cybersecurity Vulnerabilities

Trend Micro – Trend Micro – Vulnerabilities in software and infrastructure are a fact of life for developers and SREs, but that doesn’t mean you must accept them. Given the…

How to Secure AWS Serverless API(s)

Trend Micro – Trend Micro – How to Secure AWS Serverless API(s) Network Security Discover how to easily enhance security of your container-based AWS serverless API to protect against known…

How to detect Apache Log4j vulnerabilities

Trend Micro – Trend Micro – How to Detect Apache Log4j Vulnerabilities Network Security Explore how to detect Apache Log4j (Log4Shell) vulnerabilities using cloud-native security tools. By: Nitesh Surana January…

How to detect Apache HTTP Server Exploitation

Trend Micro – Trend Micro – In the above two requests and responses, we see the attacker fingerprinting vulnerable servers by running the ‘echo’ command. We observed successful exploitation attempts…

Oracle WebLogic Detection and Mitigation

Trend Micro – Trend Micro – Detection and Remediation Now that we’ve covered the vulnerabilities, let’s get into how we can detect and mitigate these critical flaws using a SaaS…

Demo: A Guide to Virtual Machine App Security

Trend Micro – Trend Micro – It may seem like containers are the go-to method for cloud building, however 95% applications run on traditional infrastructure deployments like dedicated servers, shared…