trendmicro.com
Resources curated from this publisher and indexed across appsec.fyi topic pages. Last item added: 2026-04-21.
| Date Added | Resource | Excerpt |
|---|---|---|
| 2026-04-21 2026 | The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment VariablesSupply Chain | The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables https://ift.tt/jIBeCuh |
| 2026-04-21 2026 | The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment VariablesSupply Chain | The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables https://ift.tt/K8Z5lwR |
| 2026-04-21 2026 | The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment VariablesSupply Chain | The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables https://ift.tt/D9r2QqY |
| 2026-04-20 2026 | The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment VariablesSupply Chain | The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables https://ift.tt/60RoEYV |
| 2026-04-17 2026 | What We Know About the NPM Supply Chain Attack (Trend Micro)Supply Chain | What We Know About the NPM Supply Chain Attack (Trend Micro) |
| 2026-04-16 2026 | Kong API Gateway Misconfigurations Case Study - Trend MicroAPI Sec | Kong API Gateway Misconfigurations Case Study - Trend Micro |
| 2026-04-11 2026 | Kong API Gateway Misconfigurations: A Security Case StudyAPI Sec | Kong API Gateway Misconfigurations: A Security Case Study |
| 2026-04-02 2026 | Guarding LLMs With a Layered Prompt Injection RepresentationAI | Guarding LLMs With a Layered Prompt Injection Representation https://ift.tt/Ppuaif7 |