A targeted underground doxxing campaign exposed alleged core members of Lumma Stealer (Water Kurita), resulting in a sharp decline in its activity and a migration of customers to rival infostealer platforms. This article has been indexed from Trend Micro Research,…
Category: Trend Micro Research, News and Perspectives
Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits
Trend™ Research has uncovered an attack campaign exploiting the Cisco SNMP vulnerability CVE-2025-20352, allowing remote code execution and rootkit deployment on unprotected devices, with impacts observed on Cisco 9400, 9300, and legacy 3750G series. This article has been indexed from…
Trend Micro launches new integration with Zscaler to deliver real-time, Risk-Based Zero Trust Access
Discover how Trend Vision One™ integrates with Zscaler to unify detection and access enforcement, accelerate threat containment, reduce dwell time, and deliver seamless Zero Trust protection for modern enterprises. This article has been indexed from Trend Micro Research, News and…
Weaponized AI Assistants & Credential Thieves
Learn the state of AI and the NPM ecosystem with the recent s1ngularity’ weaponized AI for credential theft. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Weaponized AI Assistants & Credential Thieves
RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits
Trend™ Research and ZDI Threat Hunters have identified a large-scale RondoDox botnet campaign exploiting over 50 vulnerabilities across more than 30 vendors, including flaws first seen in Pwn2Own contests. This article has been indexed from Trend Micro Research, News and…
How Your AI Chatbot Can Become a Backdoor
In this post of THE AI BREACH, learn how your Chatbot can become a backdoor. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: How Your AI Chatbot Can Become a Backdoor
Self-Propagating Malware Spreading Via WhatsApp, Targets Brazilian Users
Trend™ Research has identified an active campaign spreading via WhatsApp through a ZIP file attachment. When executed, the malware establishes persistence and hijacks the compromised WhatsApp account to send copies of itself to the victim’s contacts. This article has been…
CNAPP is the Solution to Multi-cloud Flexibility
Cloud-native application protection platform (CNAPP) not only helps organizations protect, but offers the flexibility of multi-cloud. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: CNAPP is the Solution to Multi-cloud Flexibility
New LockBit 5.0 Targets Windows, Linux, ESXi
Trend™ Research analyzed source binaries from the latest activity from notorious LockBit ransomware with their 5.0 version that exhibits advanced obfuscation, anti-analysis techniques, and seamless cross-platform capabilities for Windows, Linux, and ESXi systems. This article has been indexed from Trend…
This Is How Your LLM Gets Compromised
Poisoned data. Malicious LoRAs. Trojan model files. AI attacks are stealthier than ever—often invisible until it’s too late. Here’s how to catch them before they catch you. This article has been indexed from Trend Micro Research, News and Perspectives Read…
AI-Powered App Exposes User Data, Creates Risk of Supply Chain Attacks
Trend™ Research’s analysis of Wondershare RepairIt reveals how the AI-driven app exposed sensitive user data due to unsecure cloud storage practices and hardcoded credentials, creating risks of model tampering and supply chain attacks. This article has been indexed from Trend…
How AI-Native Development Platforms Enable Fake Captcha Pages
Cybercriminals are abusing AI-native platforms like Vercel, Netlify, and Lovable to host fake captcha pages that deceive users, bypass detection, and drive phishing campaigns. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article:…
What We Know About the NPM Supply Chain Attack
Trend™ Research outlines the critical details behind the ongoing NPM supply chain attack and offers essential steps to stay protected against potential compromise. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: What…
EvilAI Operators Use AI-Generated Code and Fake Apps for Far-Reaching Attacks
Combining AI-generated code and social engineering, EvilAI operators are executing a rapidly expanding campaign, disguising their malware as legitimate applications to bypass security, steal credentials, and persistently compromise organizations worldwide. This article has been indexed from Trend Micro Research, News…
What’s Your Cybersecurity Maturity?
This blog post looks at four key milestones along the cybersecurity maturity journey and poses some questions you can ask to determine the stage of your organization’s progress. This article has been indexed from Trend Micro Research, News and Perspectives…
Unmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed
An analysis of the Gentlemen ransomware group, which employs advanced, adaptive tactics, techniques, and procedure to target critical industries worldwide. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Unmasking The Gentlemen Ransomware:…
An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via ‘Cracked’ Apps
Trend™ Research analyzed a campaign distributing Atomic macOS Stealer (AMOS), a malware family targeting macOS users. Attackers disguise the malware as “cracked” versions of legitimate apps, luring users into installation. This article has been indexed from Trend Micro Research, News…
Operation Serengeti 2.0: Trend Micro Helps Law Enforcement Fight Cybercrime in Africa
Operation Serengeti 2.0: With Trend Micro’s support, INTERPOL led a major crackdown across Africa, arresting cybercriminals, dismantling infrastructures, recovering illicit funds, and protecting tens of thousands of victims. This article has been indexed from Trend Micro Research, News and Perspectives…
TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents
The TAOTH campaign exploited abandoned software and spear-phishing to deploy multiple malware families, targeting dissidents and other high-value individuals across Eastern Asia. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: TAOTH Campaign…
Leadership, Innovation, and the Future of AI: Lessons from Trend Micro CEO & Co-Founder Eva Chen
Discover how AI is reshaping cybersecurity through our CEO, Eva Chen’s industry briefing series. Gain practical strategies, real-world insights, and a clear roadmap to secure your AI initiatives with confidence. This article has been indexed from Trend Micro Research, News…