Category: Trend Micro Research, News and Perspectives

Decoding Water Sigbin’s Latest Obfuscation Tricks

Water Sigbin (aka the 8220 Gang) exploited the Oracle WebLogic vulnerabilities CVE-2017-3506 and CVE-2023-21839 to deploy a cryptocurrency miner using a PowerShell script. The threat actor also adopted new techniques to conceal its activities, making attacks harder to defend against.…

2 Weeks Out: Evolution at RSAC 2024

Discover the latest innovations in cyber defense and Trend’s expert insights on AI, data security, and emerging threats This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: 2 Weeks Out: Evolution at RSAC…

ISPM & ITDR Synergize for AI-Based Identity Security

In the ever-evolving landscape of cybersecurity, staying ahead of malicious actors requires a multifaceted approach. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: ISPM & ITDR Synergize for AI-Based Identity Security

Deepfakes and AI-Driven Disinformation Threaten Polls

Cheap and easy access to AI makes it harder to detect state-sponsored and homegrown campaigns during this election year This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Deepfakes and AI-Driven Disinformation Threaten…

Cybersecurity Decluttered: A Journey to Consolidation

Learn how far cybersecurity has come from scattered resources to consolidation the future. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Cybersecurity Decluttered: A Journey to Consolidation

Earth Freybug Uses UNAPIMON for Unhooking Critical APIs

This article provides an in-depth look into two techniques used by Earth Freybug actors: dynamic-link library (DLL) hijacking and application programming interface (API) unhooking to prevent child processes from being monitored via a new malware we’ve discovered and dubbed UNAPIMON.…

NIST Launches Cybersecurity Framework (CSF) 2.0

On February 26, 2024, the National Institute of Standards and Technology (NIST) released the official 2.0 version of the Cyber Security Framework (CSF). This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: NIST…

Jenkins Args4j CVE-2024-23897: Files Exposed, Code at Risk

Jenkins, a popular open-source automation server, was discovered to be affected by a file read vulnerability, CVE-2024-23897. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Jenkins Args4j CVE-2024-23897: Files Exposed, Code at…

A Necessary Digital Odyssey of RPA and AI/ML at HUD

Explore two RPA and AI/ML use cases at HUD during the operational challenges of the longest US Government shutdown, a rigid legacy IT environment, and complex federal regulations. This article has been indexed from Trend Micro Research, News and Perspectives…

AI Auctions: Collectibles, Taylor Swift, Jordan Bots

Discover the fascinating world of AI, ML, and RPA and their real-world applications including the creation of a custom RPA bot for collecting rare sports memorabilia. This article has been indexed from Trend Micro Research, News and Perspectives Read the…