Jim Zupon (@jzupon) 's Twitter Profile
Jim Zupon

@jzupon

Regional Security Advisor at #TrendMicro

ID: 28681769

calendar_today03-04-2009 23:14:33

3,3K Tweet

65 Followers

111 Following

Jim Zupon (@jzupon) 's Twitter Profile Photo

The #cybersecurity world around us is changing with the latest innovations of #AI and evolving #threat intel and the evolution of #XDR platforms. Will XDR reshape the need and requirements for #SIEM & #SOAR platforms? Check out Trend Micro's latest blog: bit.ly/4hLDtSY

The #cybersecurity world around us is changing with the latest innovations of #AI and evolving #threat intel and the evolution of #XDR platforms. Will XDR reshape the need and requirements for #SIEM & #SOAR platforms?
 
Check out <a href="/TrendMicro/">Trend Micro</a>'s latest blog: bit.ly/4hLDtSY
Jim Zupon (@jzupon) 's Twitter Profile Photo

It’s a new year, but before we look forward to breaking all of our resolutions, let’s pause to take a look at the year that was for Trend Micro Zero Day Initiative™ (Trend Zero Day Initiative): bit.ly/4gvy1Te

Jim Zupon (@jzupon) 's Twitter Profile Photo

In 2022, Trend Micro conducted extensive research to understand potential cyber threats to the #metaverse The release of Apple's #AppleVisionPro headset provided an opportunity to evaluate these predictions Read here: bit.ly/3ErYzr0

Jim Zupon (@jzupon) 's Twitter Profile Photo

Microsoft hosted an AI challenge and Trend Micro's AI Lab had 2 teams participate who took 2nd (Abyss Watches) and 4th places (A helpful assistant). Congrats to my colleagues as this shows we have some of the best people in the world working at Trend! bit.ly/3XhPK9I

Jim Zupon (@jzupon) 's Twitter Profile Photo

🚨 The threat landscape is exploding. But fear not, Omdia’s global analysts declare that true resilience begins with bold, proactive cyber risk exposure management (CREM). 💪 Embrace the future of security now with Trend Micro: bit.ly/4kg0O16 #CyberResilience

🚨 The threat landscape is exploding. But fear not, Omdia’s global analysts declare that true resilience begins with bold, proactive cyber risk exposure management (CREM). 💪 

Embrace the future of security now with <a href="/TrendMicro/">Trend Micro</a>: bit.ly/4kg0O16
 #CyberResilience
Jim Zupon (@jzupon) 's Twitter Profile Photo

.Trend Micro's threat researchers uncovered the Badbox 2.0 attack campaign, which revealed that millions of compromised Android devices are being used for ad fraud. Read how we partnered with HUMAN and others to disrupt the operation: bit.ly/3Fhx587

Jim Zupon (@jzupon) 's Twitter Profile Photo

Is Your AI Secure? Discover how Chain of Thought (CoT) reasoning in DeepSeek-R1 can be exploited for prompt attacks and data theft. Trend Micro's article breaks down the vulnerabilities and offers strategies to mitigate these risks: bit.ly/3QO22D2

Jim Zupon (@jzupon) 's Twitter Profile Photo

Anticipate. Adapt. Act. Join Trend Micro's future-defining live virtual event to better anticipate threats, outmaneuver risks, and crush adversary moves 💥 APRIL 16 | 12PM EST APRIL 17 | 9AM SGT APRIL 17 | 9AM BST Secure your spot: bit.ly/3RiKgYU

Anticipate. Adapt. Act. Join <a href="/TrendMicro/">Trend Micro</a>'s future-defining live virtual event to better anticipate threats, outmaneuver risks, and crush adversary moves 💥

APRIL 16 | 12PM EST 
APRIL 17 | 9AM SGT 
APRIL 17 | 9AM BST 

Secure your spot: bit.ly/3RiKgYU
Jim Zupon (@jzupon) 's Twitter Profile Photo

💥 Don't let asset visibility gaps jeopardize your operational continuity and brand reputation. Dive into Trend Micro's global #RiskStudy to uncover insights and discover why #ProactiveSecurity matters: bit.ly/3RiKgYU

💥 Don't let asset visibility gaps jeopardize your operational continuity and brand reputation.

Dive into <a href="/TrendMicro/">Trend Micro</a>'s global #RiskStudy to uncover insights and discover why #ProactiveSecurity matters: bit.ly/3RiKgYU
Jim Zupon (@jzupon) 's Twitter Profile Photo

Since January, FOG #ransomware has affected over a hundred victims, primarily targeting the tech, education, and healthcare sectors. See the whole victimology in Trend Micro's blog entry: bit.ly/4jwsWwg

Jim Zupon (@jzupon) 's Twitter Profile Photo

New #TrendTalksThreat! Join Jon Clay, VP of Threat Intelligence at Trend Micro, as he unpacks the key insights from the Trend 2025 Cyber Risk Report. From average cyber risk scores across regions and industries to the highest-risk events on the horizon: bit.ly/4jKWoOu

Jim Zupon (@jzupon) 's Twitter Profile Photo

Beware of fraudulent job interviews targeting IT professionals in the US, Germany, and Ukraine. Learn how North Korean cyber actors linked to Void Dokkaebi are stealing #cryptocurrency through these schemes. Full analysis by Trend Micro: bit.ly/44H8bcu

Beware of fraudulent job interviews targeting IT professionals in the US, Germany, and Ukraine. Learn how North Korean cyber actors linked to Void Dokkaebi are stealing #cryptocurrency through these schemes. 

Full analysis by <a href="/TrendMicro/">Trend Micro</a>: bit.ly/44H8bcu
Jim Zupon (@jzupon) 's Twitter Profile Photo

In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, Trend Research Team details a recently patched code execution vulnerability in the Apple macOS operating system. Learn more: bit.ly/3Z5X0Xc

Jim Zupon (@jzupon) 's Twitter Profile Photo

.Trend Micro research examines vulnerabilities that affect Large Language Model (LLM) powered agents with code execution, document upload, and internet access capabilities. This is the second part of a series: bit.ly/4d2U57r

Jim Zupon (@jzupon) 's Twitter Profile Photo

According to Jon Clay from Trend Micro, scammers may direct travelers to phony websites claiming to offer fast-track REAL ID services for a fee. Read more: ➡️ bit.ly/4kbbZHE

Jim Zupon (@jzupon) 's Twitter Profile Photo

🚀 Go beyond the A, B, CVEs of vulnerabilities and discover how Trend Vision One™ prioritizes what matters with real-world threat intelligence. 🌟 Watch our demo session, featuring Trend Micro's #ProactiveSecurity insiders, right now: bit.ly/4kcdgyr

🚀 Go beyond the A, B, CVEs of vulnerabilities and discover how Trend Vision One™ prioritizes what matters with real-world threat intelligence. 

🌟 Watch our demo session, featuring <a href="/TrendMicro/">Trend Micro</a>'s #ProactiveSecurity insiders, right now: bit.ly/4kcdgyr
Jim Zupon (@jzupon) 's Twitter Profile Photo

.Trend Micro is proud to enhance the security of AI systems with #NVIDIA by integrating our cybersecurity solutions with NVIDIA-Certified systems. Together, we are focused on securing the full AI lifecycle across cloud, data center, and AI factories: bit.ly/45eNiFN

.<a href="/TrendMicro/">Trend Micro</a> is proud to enhance the security of AI systems with #NVIDIA by integrating our cybersecurity solutions with NVIDIA-Certified systems. Together, we are focused on securing the full AI lifecycle across cloud, data center, and AI factories: bit.ly/45eNiFN
Jim Zupon (@jzupon) 's Twitter Profile Photo

We’re proud to announce that Trend Vision One is now integrated into the NVIDIA Enterprise AI Factory validated design, bringing agentic AI-powered protection to data across on-premises, cloud, and hybrid environments: bit.ly/43kM5dH

We’re proud to announce that Trend Vision One is now integrated into the NVIDIA Enterprise AI Factory validated design, bringing agentic AI-powered protection to data across on-premises, cloud, and hybrid environments: bit.ly/43kM5dH
Jim Zupon (@jzupon) 's Twitter Profile Photo

Accelerate your proactive cloud security journey. It all starts with Trend Vision One™ Cloud Security and Trend Micro was recently recognized as a Leader in cloud-native application protection platforms (CNAPP). Read the excerpt: bit.ly/4kgzQ8l

Accelerate your proactive cloud security journey. It all starts with Trend Vision One™ Cloud Security and <a href="/TrendMicro/">Trend Micro</a> was recently recognized as a Leader in cloud-native application protection platforms (CNAPP). 

Read the excerpt: bit.ly/4kgzQ8l