
Trellix
@Trellix
Followers
250K
Following
5K
Media
3K
Statuses
5K
The Platform CISOs Trust
Silicon Valley, CA
Joined May 2009
Concerned about the latest Iranian cyber tactics? Donβt miss our upcoming webinar, βCode, Conflict, and Chaos.β Trellix's Anne An and Alyssa Parenteau will share expert insights on emerging attack vectors and practical defense strategies. https://t.co/YnOrLxoKT6
1
1
0
Happy #HispanicHeritageMonth! We're celebrating the amazing contributions of Hispanic and Latino professionals who are shaping the future of tech and cybersecurity.
0
0
1
GenAI for defense? Absolutely! π @Gartner_inc report shows how security teams can leverage GenAI: SOC chatbots, secure app dev assistants & more to boost productivity & cut false positives. Download now: https://t.co/Q4MCIrOVze
0
0
0
98% of CISOs struggle to operationalize threat intelligence. Let that sink in. Our research uncovers this critical industry challenge and what it means for your security posture. Read the report today: https://t.co/PC0xOxWCfo
0
0
1
π¦ Shine a light on threats lurking in the shadows. Take the Trellix Insights interactive product tour for a spin and see for yourself how you can transform threat intelligence into action. https://t.co/e12VtCEExk
0
1
0
APJ: Join our hands-on virtual workshop on 1 October to self-assess your maturity, map your journey, and get practical steps for operationalizing your assets. Space is limited! https://t.co/kUH9nI4Qrv
0
0
1
"Well-known for their product knowledge and use case expertise." Our customers praise Trellix Professional Services for their responsive, professional, and strategic support. Read more highlights. https://t.co/eT3WpUqWom
0
0
0
New research from @TrellixARC uncovers a sophisticated new infection chain for the XWorm malware. Attackers are using legitimate file names, such as 'discord.exe,' to trick users and evade detection. @gbhackers_news has more:
gbhackers.com
Cybersecurity researchers have identified a sophisticated evolution in XWorm malware operations, with the backdoor campaign.
0
2
1
What will you gain at the Trellix Operational Threat Intel Virtual Summit - APJ on 11 Sept? π€ π§ Transform intel into action β‘ Respond faster to threats π€ Hear from leading experts Last call to register! https://t.co/vwzMuV1Tdc
1
0
0
Trellix is honored to be included in the new @marketsmarkets "Generative AI Cybersecurity Market" report! π We're recognized in two key categories: π€ Cybersecurity Providers for Generative AI π» Endpoint Security Provider Download the report: https://t.co/lg2V78HKck
marketsandmarkets.com
[420 Pages Report] Generative AI cybersecurity market size, share, analysis, trends & forecasts. The global market for generative AI cybersecurity categorized by Generative AI-based Cybersecurity,...
0
0
1
Final call! π¨ Join us at the Trellix Operational Threat Intel Virtual Summit. Hear real stories of infiltrating ransomware gangs and get practical strategies from our experts. Plus, a CISA-led panel. Learn to turn intel into action! Register now! https://t.co/vwzMuV1Tdc
0
0
0
CISOs, itβs time to build your network! Our CISO, Michael Green, discusses how strong peer communities help security leaders fight burnout and increase efficiency. Read the full interview. @HelpNetSecurity
https://t.co/BlUsm1wm1t
helpnetsecurity.com
This interview explores how every CISO can strengthen resilience by building trusted community networks for collaboration, support, insight.
0
0
1
Our latest blog post reveals how attacks use living-off-the-land techniques via native Windows commands for stealthy lateral movement. Learn how Trellix NDR helps you detect these silent threats. https://t.co/GeFysltKHL
0
0
2
Transform threat intel into action for EMEA! π Join the Trellix Operational Threat Intel Virtual Summit on Thursday, 11 September. Hear from top experts, gain key insights, and learn to mitigate attacks faster. Secure your spot! https://t.co/vwzMuV1Tdc
1
0
0
New podcast from @securitydailyr reveals a cyber-espionage campaign targeting South Korean embassies. Based on @TrellixARC research, the attack is linked to North Korea's Kimsuky and suspected Chinese involvement. π§ Listen now.
dailysecurityreview.com
A new wave of state-sponsored cyber espionage is sweeping across South Korea, targeting foreign embassies through highly tailored, multi-stage spearphishing
1
1
1
AMERICAS: Ready to turn threat intel into your next move? Discover how to: β‘ Respond faster π Contextualize attacks π Integrate intel strategically Register now! https://t.co/vwzMuV1Tdc
0
0
2
Whatβs on the Mind of the CISO? π‘ We're breaking down our research on threat intelligence with Brian Brown & John Fokker. Download the E-book for more: https://t.co/PC0xOxWCfo
0
0
1
Keeping your organization safe starts with awareness. Check out the latest #cybersecurity threats now. β‘οΈ https://t.co/ukAsAol23h
6
1
1
Your self-hosted SharePoint Server could be at risk. π¨ The ToolShell vulnerability chain is being actively exploited for unauthenticated remote code execution. This is a serious threat. Our blog post has the details and crucial next steps. Read it here: https://t.co/RkqhPdRkeK
0
3
3
Threat actors are using #AI against you. Learn how to empower your team to be your first line of defense in our upcoming webinar. π
Join us: Thursday, 18 September β 9:00 am BST, 10:00 am CEST https://t.co/TWNJdkZB4D
0
0
1