jzupon Profile Banner
Jim Zupon Profile
Jim Zupon

@jzupon

Followers
64
Following
661
Media
2K
Statuses
3K

Regional Security Advisor at #TrendMicro

California, USA
Joined April 2009
Don't wanna be here? Send us removal request.
@jzupon
Jim Zupon
3 months
Protect against the latest risks impacting LLMs and Gen AI while driving innovation. Strengthen your security posture and stay ahead of adversaries. It all starts with @TrendMicro's Agentic AI cybersecurity platform, Trend Vision One™. Learn more: https://t.co/6Akt46K2LR
0
0
0
@jzupon
Jim Zupon
4 months
🔓 Unlock a new approach to building a more secure, resilient future and discover how @TrendMicro's Digital Twin technology revolutionizes cybersecurity, enhancing risk awareness and operational readiness. 🧐 Read the industry brief: https://t.co/WT8YjaLaiy
0
0
1
@jzupon
Jim Zupon
4 months
🎉 Celebrating 20 years of the @thezdi 🎉 Since 2005, Trend ZDI has led the industry as the world’s largest vendor-agnostic bug bounty program—driving responsible vulnerability disclosure through ethical hacking competitions worldwide. Discover Now: https://t.co/nZJqfEbGLT
0
0
0
@jzupon
Jim Zupon
6 months
Accelerate your proactive cloud security journey. It all starts with Trend Vision One™ Cloud Security and @TrendMicro was recently recognized as a Leader in cloud-native application protection platforms (CNAPP). Read the excerpt: https://t.co/Wo1gh2aNSU
0
0
1
@jzupon
Jim Zupon
7 months
We’re proud to announce that Trend Vision One is now integrated into the NVIDIA Enterprise AI Factory validated design, bringing agentic AI-powered protection to data across on-premises, cloud, and hybrid environments: https://t.co/ckHJAxPsF9
0
0
0
@jzupon
Jim Zupon
7 months
.@TrendMicro is proud to enhance the security of AI systems with #NVIDIA by integrating our cybersecurity solutions with NVIDIA-Certified systems. Together, we are focused on securing the full AI lifecycle across cloud, data center, and AI factories: https://t.co/RTRnGi33Ja
0
0
1
@jzupon
Jim Zupon
7 months
🚀 Go beyond the A, B, CVEs of vulnerabilities and discover how Trend Vision One™ prioritizes what matters with real-world threat intelligence. 🌟 Watch our demo session, featuring @TrendMicro's #ProactiveSecurity insiders, right now: https://t.co/vgqTcWCddc
0
0
0
@jzupon
Jim Zupon
7 months
According to Jon Clay from @TrendMicro, scammers may direct travelers to phony websites claiming to offer fast-track REAL ID services for a fee. Read more: ➡️
clickorlando.com
Cybersecurity experts are warning that the rush to comply is creating a perfect opportunity for scammers.
0
0
0
@jzupon
Jim Zupon
7 months
.@TrendMicro research examines vulnerabilities that affect Large Language Model (LLM) powered agents with code execution, document upload, and internet access capabilities. This is the second part of a series:
Tweet card summary image
trendmicro.com
Our research examines vulnerabilities that affect Large Language Model (LLM) powered agents with code execution, document upload, and internet access capabilities. This is the second part of a series...
0
0
1
@jzupon
Jim Zupon
7 months
In this excerpt of a @TrendMicro Vulnerability Research Service vulnerability report, Trend Research Team details a recently patched code execution vulnerability in the Apple macOS operating system. Learn more:
Tweet card summary image
zerodayinitiative.com
In this excerpt of a Trend Vulnerability Research Service vulnerability report, Nikolai Skliarenko and Yazhi Wang of the Trend™ Research Team detail a recently patched code execution vulnerability in...
0
0
0
@jzupon
Jim Zupon
8 months
Beware of fraudulent job interviews targeting IT professionals in the US, Germany, and Ukraine. Learn how North Korean cyber actors linked to Void Dokkaebi are stealing #cryptocurrency through these schemes. Full analysis by @TrendMicro: https://t.co/Sb6E475JPW
1
0
3
@jzupon
Jim Zupon
8 months
New #TrendTalksThreat! Join Jon Clay, VP of Threat Intelligence at @TrendMicro, as he unpacks the key insights from the Trend 2025 Cyber Risk Report. From average cyber risk scores across regions and industries to the highest-risk events on the horizon: https://t.co/uq4Xpo43zj
0
0
1
@jzupon
Jim Zupon
8 months
Since January, FOG #ransomware has affected over a hundred victims, primarily targeting the tech, education, and healthcare sectors. See the whole victimology in @TrendMicro's blog entry:
Tweet card summary image
trendmicro.com
This blog details our investigation of malware samples that conceal within them a FOG ransomware payload.
0
0
0
@jzupon
Jim Zupon
8 months
💥 Don't let asset visibility gaps jeopardize your operational continuity and brand reputation. Dive into @TrendMicro's global #RiskStudy to uncover insights and discover why #ProactiveSecurity matters: https://t.co/Yv29KXFmfu
0
0
0
@jzupon
Jim Zupon
9 months
Anticipate. Adapt. Act. Join @TrendMicro's future-defining live virtual event to better anticipate threats, outmaneuver risks, and crush adversary moves 💥 APRIL 16 | 12PM EST APRIL 17 | 9AM SGT APRIL 17 | 9AM BST Secure your spot: https://t.co/Yv29KXFmfu
0
0
0
@jzupon
Jim Zupon
9 months
Is Your AI Secure? Discover how Chain of Thought (CoT) reasoning in DeepSeek-R1 can be exploited for prompt attacks and data theft. @TrendMicro's article breaks down the vulnerabilities and offers strategies to mitigate these risks:
Tweet card summary image
trendmicro.com
This entry explores how the Chain of Thought reasoning in the DeepSeek-R1 AI model can be susceptible to prompt attacks, insecure output generation and sensitive data theft.
0
0
0
@jzupon
Jim Zupon
9 months
.@TrendMicro's threat researchers uncovered the Badbox 2.0 attack campaign, which revealed that millions of compromised Android devices are being used for ad fraud. Read how we partnered with HUMAN and others to disrupt the operation:
Tweet card summary image
wired.com
New research shows at least a million inexpensive Android devices—from TV streaming boxes to car infotainment systems—are compromised to allow bad actors to commit ad fraud and other cybercrime.
0
0
0
@jzupon
Jim Zupon
10 months
🚨 The threat landscape is exploding. But fear not, Omdia’s global analysts declare that true resilience begins with bold, proactive cyber risk exposure management (CREM). 💪 Embrace the future of security now with @TrendMicro: https://t.co/oQJ3m90Rwu #CyberResilience
0
0
1
@jzupon
Jim Zupon
10 months
Chinese hackers exploit MAVInject.exe to evade detection in targeted cyber attacks. Learn more from @TrendMicro:
0
0
0
@jzupon
Jim Zupon
10 months
Microsoft hosted an AI challenge and Trend Micro's AI Lab had 2 teams participate who took 2nd (Abyss Watches) and 4th places (A helpful assistant). Congrats to my colleagues as this shows we have some of the best people in the world working at Trend!
0
0
0