Category: Trend Micro Research, News and Perspectives

Weaponized AI Assistants & Credential Thieves

Learn the state of AI and the NPM ecosystem with the recent s1ngularity’ weaponized AI for credential theft. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Weaponized AI Assistants & Credential Thieves

How Your AI Chatbot Can Become a Backdoor

In this post of THE AI BREACH, learn how your Chatbot can become a backdoor. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: How Your AI Chatbot Can Become a Backdoor

CNAPP is the Solution to Multi-cloud Flexibility

Cloud-native application protection platform (CNAPP) not only helps organizations protect, but offers the flexibility of multi-cloud. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: CNAPP is the Solution to Multi-cloud Flexibility

New LockBit 5.0 Targets Windows, Linux, ESXi

Trend™ Research analyzed source binaries from the latest activity from notorious LockBit ransomware with their 5.0 version that exhibits advanced obfuscation, anti-analysis techniques, and seamless cross-platform capabilities for Windows, Linux, and ESXi systems. This article has been indexed from Trend…

This Is How Your LLM Gets Compromised

Poisoned data. Malicious LoRAs. Trojan model files. AI attacks are stealthier than ever—often invisible until it’s too late. Here’s how to catch them before they catch you. This article has been indexed from Trend Micro Research, News and Perspectives Read…

How AI-Native Development Platforms Enable Fake Captcha Pages

Cybercriminals are abusing AI-native platforms like Vercel, Netlify, and Lovable to host fake captcha pages that deceive users, bypass detection, and drive phishing campaigns. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article:…

What We Know About the NPM Supply Chain Attack

Trend™ Research outlines the critical details behind the ongoing NPM supply chain attack and offers essential steps to stay protected against potential compromise. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: What…

What’s Your Cybersecurity Maturity?

This blog post looks at four key milestones along the cybersecurity maturity journey and poses some questions you can ask to determine the stage of your organization’s progress. This article has been indexed from Trend Micro Research, News and Perspectives…