Trend Micro is closely monitoring the evolving cyber threat activity related to the Russian invasion of Ukraine. We are focused on protecting our customers and partners that may be affected by these threats, and to that end, we are providing resources and guidance.
Our research teams and threat hunters will work vigilantly to monitor and identify any new threat intelligence and will continue to share updates. If attacks extend beyond the current region, we will be there to lend our support.
Section 0 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 0 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Security posture
Revisit your overall security posture and ensure that you have fully deployed and properly configured your protection around best practices—similar to fortifying your environment against ransomware and destructive attacks. Enable specific controls, such as ransomware protection and behavioral monitoring, and make sure EDR is deployed on critical assets.
Updates and patches
Ensure all products and technology have the latest updates and patches—many attacks start with exploits of known vulnerabilities that may have already been patched. Take note of high-severity vulnerabilities and external-facing servers and infrastructure.
Suspicious activity
Be vigilant around suspicious activity in your network and digital environment. Pay attention to new/unusual traffic and abnormal activity within operations. Monitor any early warning detection alerts and request assistance if needed.
Section 1 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
This knowledge base article for Trend Micro customers and partners provides relevant support and advisories from various government cybersecurity agencies around the world. |
Global Cyberattacks Tied to the Russian Invasion of Ukraine With so much diversity in the attack surface, we provide security best practices to manage your cyber risk. |
Ukraine Cyberattack 2022: Geopolitical Cybersecurity Our latest blog delivers timely insight into the rising importance on improving cyber-resilience, threat detection, and response. |
Keeping Safe with Trend Micro Security During These Uncertain Times While the focus often remains on cyber hygiene from an organizational standpoint, it is important to keep your family safe online during this crisis. This blog provides you with valuable tips. |
Cyberattacks are Prominent in the Russia-Ukraine Conflict Alongside the conflict between Russia and Ukraine, there’s an increasing number of alleged cyberattacks perpetrated by different groups. We verify internal data and external reports to provide accurate information that can be used to strengthen defenses. |
Keeping Safe with Trend Micro Security During These Uncertain Times While the focus often remains on cyber hygiene from an organizational standpoint, it is important to keep your family safe online during this crisis. This consumer-facing blog provides you with valuable tips and reminders. |
Global Cyberattacks: Managing Risk in Chaotic Times With so much diversity in the attack surface, we provide security best practices to manage your cyber risk. |
Keeping Safe with Trend Micro Security During These Uncertain Times While the focus often remains on cyber hygiene from an organizational standpoint, it is important to keep your family safe online during this crisis. This consumer-facing blog provides you with valuable tips and reminders. |
Read about the Indicators of Compromise:
IOC Resource for Russia-Ukraine Conflict-Related Cyberattacks
Section 4 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 4 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
We invite you to reach out with any questions. We will be happy to help you in any way we can.
Section 5 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 5 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 5 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.