Category: Trend Micro Research, News and Perspectives

CrazyHunter Campaign Targets Taiwanese Critical Sectors

This blog entry details research on emerging ransomware group CrazyHunter, which has launched a sophisticated campaign aimed at Taiwan’s essential services. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: CrazyHunter Campaign Targets…

CTEM + CREM: Aligning Your Cybersecurity Strategy

Cyber threats evolve daily, and organizations need to move beyond traditional security approaches to stay ahead. That’s why Continuous Threat Exposure Management (CTEM), a concept introduced by Gartner, has been gaining traction. CTEM isn’t just another cybersecurity buzzword; it’s a…

GTC 2025: AI, Security & The New Blueprint

From quantum leaps to AI factories, GTC 2025 proved one thing: the future runs on secure foundations. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: GTC 2025: AI, Security & The New…

Capacity is Critical in Riskier Threat Landscape

International cooperation, reporting, and capacity building are critical to enhance cybersecurity defenses. Effective governance in an increasingly risky landscape requires visibility as well as coordinated vulnerability disclosure. This article has been indexed from Trend Micro Research, News and Perspectives Read…

A Deep Dive into Water Gamayun’s Arsenal and Infrastructure

Trend Research discusses the delivery methods, custom payloads, and techniques used by Water Gamayun, the suspected Russian threat actor abusing a zero-day vulnerability in the Microsoft Management Console framework (CVE-2025-26633) to execute malicious code on infected machines. This article has…

Cybertron Reshapes AI Security as “Cyber Brain” Grows

Previously exclusive to Trend Vision One customers, select Trend Cybertron models, datasets and agents are now available via open-source. Build advanced security solutions and join us in developing the next generation of AI security technology. This article has been indexed…

Updated Shadowpad Malware Leads to Ransomware Deployment

In this blog, we discuss about how Shadowpad is being used to deploy a new undetected ransomware family. They deploy the malware exploiting weak passwords and bypassing multi-factor authentication This article has been indexed from Trend Micro Research, News and…