Trend Micro encourages responsible security researchers to contact the Trend Micro Product Vulnerability Response Team by sending an email to email@example.com.
Technical specialists from Trend Micro will acknowledge the receipt of the submission and then begin the process of collaborating with the submitter, validating, reproducing, and ultimately resolving the potential issue if it is confirmed to be a legitimate security vulnerability.
Each vulnerability is unique and, due to the complexity of Trend Micro’s products and service components, will be addressed in a manner most appropriate for the specific vulnerability. Trend Micro’s goal is to address confirmed vulnerabilities as quickly and thoroughly as possible and to identify the best way to distribute the resolution to affected customers.
Ongoing dialog between the Trend Micro Product Vulnerability Response team and the submitter throughout this entire process is highly encouraged to best understand the vulnerability and potential exploits, culminating in some independent verification of the solution.
Responsible security researchers understand that the integrity and security of the customers is the first priority, and will work with Trend Micro to ensure that all necessary vulnerabilities are resolved and customers have ample opportunity to deploy the fixes required before releasing information regarding the findings on a public forum, blog, or social media.
The firstname.lastname@example.org address is only for the use of submitting potential product vulnerabilities. Regular product support, including malware or threat-related inquires, should be directed to your authorized Trend Micro Technical Support representative for your region.