Learn how Trend’s Cybertron has been harnessing the power of NVIDIA Universal LLM NIM Microservices. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Enabling Secure AI Inference: Trend Cybertron Leverages NVIDIA Universal…
Tag: Trend Micro Research, News and Perspectives
Keeping Pace and Embracing Emerging Technologies
Trend Micro and the NEOM McLaren Formula E Team stay ahead of the curve by embracing new technologies, fostering a no-blame culture, and making split-second decisions in high-stakes environments. This article has been indexed from Trend Micro Research, News and…
NEOM McLaren Formula E Team & Trend Micro Innovation History
Explore how innovation becomes a team sport when Trend Micro and the NEOM McLaren Formula E Team leaders come together to talk culture, risk, and forward thinking. This article has been indexed from Trend Micro Research, News and Perspectives Read…
Driving Success on the Track or in the Boardroom
Discover how the Trend Micro and the NEOM McLaren Formula E Team partnership is powered by a common vision for winning, on the track and in the boardroom. This article has been indexed from Trend Micro Research, News and Perspectives…
Earth Lamia Develops Custom Arsenal to Target Multiple Industries
Trend™ Research has been tracking an active APT threat actor named Earth Lamia, targeting multiple industries in Brazil, India and Southeast Asia countries at least since 2023. The threat actor primarily exploits vulnerabilities in web applications to gain access to…
Trend Joins NVIDIA to Secure AI Infrastructure with NVIDIA
Together, we are focused on securing the full AI lifecycle—from development and training to deployment and inference—across cloud, data center, and AI factories. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Trend…
Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan
Trend™ Research discusses the evolving tradecraft of threat actor Earth Ammit, proven by the advanced toolset used in its TIDRONE and VENOM campaigns that targeted the drone supply chain. This article has been indexed from Trend Micro Research, News and…
Trend Micro Puts a Spotlight on AI at Pwn2Own Berlin
Get a sneak peak into how Trend Micro’s Pwn2Own Berlin 2025 is breaking new ground, focusing on AI infrastructure and finding the bugs to proactively safeguard the future of computing. This article has been indexed from Trend Micro Research, News…
Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan
Trend™ Research discusses the evolving tradecraft of threat actor Earth Ammit, proven by the advanced toolset used in its TIDRONE and VENOM campaigns that targeted the drone supply chain. This article has been indexed from Trend Micro Research, News and…
Agenda Ransomware Group Adds SmokeLoader and NETXLOADER to Their Arsenal
During our monitoring of Agenda ransomware activities, we uncovered campaigns that made use of the SmokeLoader malware and a new loader we’ve named NETXLOADER. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article:…
Exploring PLeak: An Algorithmic Method for System Prompt Leakage
What is PLeak, and what are the risks associated with it? We explored this algorithmic technique and how it can be used to jailbreak LLMs, which could be leveraged by threat actors to manipulate systems and steal sensitive data. This…
Earth Kasha Updates TTPs in Latest Campaign Targeting Taiwan and Japan
This blog discusses the latest modifications observed in Earth Kasha’s TTPs from their latest campaign detected in March 2025 targeting Taiwan and Japan. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Earth…
NVIDIA Riva Vulnerabilities Leave AI-Powered Speech and Translation Services at Risk
Trend Research uncovered misconfigurations in NVIDIA Riva deployments, with two vulnerabilities, CVE-2025-23242 and CVE-2025-23243, contributing to their exposure. These security flaws could lead to unauthorized access, resource abuse, and potential misuse or theft of AI-powered inference services, including speech recognition…
Earth Kurma APT Campaign Targets Southeast Asian Government, Telecom Sectors
An APT group dubbed Earth Kurma is actively targeting government and telecommunications organizations in Southeast Asia using advanced malware, rootkits, and trusted cloud services to conduct cyberespionage. This article has been indexed from Trend Micro Research, News and Perspectives Read…
Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations
In this blog entry, we discuss how North Korea’s significant role in cybercrime – including campaigns attributed to Void Dokkaebi – is facilitated by extensive use of anonymization networks and the use of Russian IP ranges. This article has been…
FOG Ransomware Spread by Cybercriminals Claiming Ties to DOGE
This blog details our investigation of malware samples that conceal within them a FOG ransomware payload. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: FOG Ransomware Spread by Cybercriminals Claiming Ties to…
FOG Ransomware Spread by Cybercriminals Claiming Ties to DOGE
This blog details our investigation of malware samples that conceal within them a FOG ransomware payload. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: FOG Ransomware Spread by Cybercriminals Claiming Ties to…
CrazyHunter Campaign Targets Taiwanese Critical Sectors
This blog entry details research on emerging ransomware group CrazyHunter, which has launched a sophisticated campaign aimed at Taiwan’s essential services. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: CrazyHunter Campaign Targets…
ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains
In ZDI-23-1527 and ZDI-23-1528 we uncover two possible scenarios where attackers could have compromised the Microsoft PC Manager supply chain. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: ZDI-23-1527 and ZDI-23-1528: The…
BPFDoor’s Hidden Controller Used Against Asia, Middle East Targets
A controller linked to BPF backdoor can open a reverse shell, enabling deeper infiltration into compromised networks. Recent attacks have been observed targeting the telecommunications, finance, and retail sectors across South Korea, Hong Kong, Myanmar, Malaysia, and Egypt. This article…
Incomplete NVIDIA Patch to CVE-2024-0132 Exposes AI Infrastructure and Data to Critical Risks
A previously disclosed vulnerability in NVIDIA Container Toolkit has an incomplete patch, which, if exploited, could put a wide range of AI infrastructure and sensitive data at risk. This article has been indexed from Trend Micro Research, News and Perspectives…
CTEM + CREM: Aligning Your Cybersecurity Strategy
Cyber threats evolve daily, and organizations need to move beyond traditional security approaches to stay ahead. That’s why Continuous Threat Exposure Management (CTEM), a concept introduced by Gartner, has been gaining traction. CTEM isn’t just another cybersecurity buzzword; it’s a…
GTC 2025: AI, Security & The New Blueprint
From quantum leaps to AI factories, GTC 2025 proved one thing: the future runs on secure foundations. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: GTC 2025: AI, Security & The New…
Capacity is Critical in Riskier Threat Landscape
International cooperation, reporting, and capacity building are critical to enhance cybersecurity defenses. Effective governance in an increasingly risky landscape requires visibility as well as coordinated vulnerability disclosure. This article has been indexed from Trend Micro Research, News and Perspectives Read…
The Espionage Toolkit of Earth Alux: A Closer Look at its Advanced Techniques
The cyberespionage techniques of Earth Alux, a China-linked APT group, are putting critical industries at risk. The attacks, aimed at the APAC and Latin American regions, leverage powerful tools and techniques to remain hidden while stealing sensitive data. This article…
A Deep Dive into Water Gamayun’s Arsenal and Infrastructure
Trend Research discusses the delivery methods, custom payloads, and techniques used by Water Gamayun, the suspected Russian threat actor abusing a zero-day vulnerability in the Microsoft Management Console framework (CVE-2025-26633) to execute malicious code on infected machines. This article has…
Cybertron Reshapes AI Security as “Cyber Brain” Grows
Previously exclusive to Trend Vision One customers, select Trend Cybertron models, datasets and agents are now available via open-source. Build advanced security solutions and join us in developing the next generation of AI security technology. This article has been indexed…
CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin
Trend Research identified Russian threat actor Water Gamayun exploiting CVE-2025-26633, a zero-day vulnerability in the Microsoft Management Console that attackers exploit to execute malicious code and exfiltrate data. This article has been indexed from Trend Micro Research, News and Perspectives…
Albabat Ransomware Group Potentially Expands Targets to Multiple OS, Uses GitHub to Streamline Operations
Trend Research encounters new versions of the Albabat ransomware, which appears to target Windows, Linux, and macOS devices. We also reveal the group’s use of GitHub to streamline their ransomware operation. This article has been indexed from Trend Micro Research,…
SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware
Trend Research analyzed SocGholish’s MaaS framework and its role in deploying RansomHub ransomware through compromised websites, using highly obfuscated JavaScript loaders to evade detection and execute various malicious tasks. This article has been indexed from Trend Micro Research, News and…
AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution
In this blog entry, we uncovered a campaign that uses fake GitHub repositories to distribute SmartLoader, which is then used to deliver Lumma Stealer and other malicious payloads. The campaign leverages GitHub’s trusted reputation to evade detection, using AI-generated content…
From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario
Trend Micro™ Managed XDR assisted in an investigation of a B2B BEC attack that unveiled an entangled mesh weaved by the threat actor with the help of a compromised server, ensnaring three business partners in a scheme that spanned for…
Exploiting DeepSeek-R1: Breaking Down Chain of Thought Security
This entry explores how the Chain of Thought reasoning in the DeepSeek-R1 AI model can be susceptible to prompt attacks, insecure output generation, and sensitive data theft. This article has been indexed from Trend Micro Research, News and Perspectives Read…
Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal
In this blog entry, we discuss how the Black Basta and Cactus ransomware groups utilized the BackConnect malware to maintain persistent control and exfiltrate sensitive data from compromised machines. This article has been indexed from Trend Micro Research, News and…
Updated Shadowpad Malware Leads to Ransomware Deployment
In this blog, we discuss about how Shadowpad is being used to deploy a new undetected ransomware family. They deploy the malware exploiting weak passwords and bypassing multi-factor authentication This article has been indexed from Trend Micro Research, News and…
Earth Preta Mixes Legitimate and Malicious Components to Sidestep Detection
Our Threat Hunting team discusses Earth Preta’s latest technique, in which the APT group leverages MAVInject and Setup Factory to deploy payloads, bypass ESET antivirus, and maintain control over compromised systems. This article has been indexed from Trend Micro Research,…
Chinese-Speaking Group Manipulates SEO with BadIIS
This blog post details our analysis of an SEO manipulation campaign targeting Asia. We also share recommendations that can help enterprises proactively secure their environment. This article has been indexed from Trend Micro Research, News and Perspectives Read the original…
CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks
The ZDI team offers an analysis on how CVE-2025-0411, a zero-day vulnerability in 7-Zip, was actively exploited to target Ukrainian organizations in a SmokeLoader campaign involving homoglyph attacks. This article has been indexed from Trend Micro Research, News and Perspectives…
Native Sensors vs. Integrations for XDR Platforms?
Native sensors vs. integrations in XDR: Native sensors offer faster deployment, real-time detection, and deeper visibility, while integrations may add complexity and delays. Learn how to optimize your XDR strategy for improved security. This article has been indexed from Trend…
Future of Cybersecurity: Will XDR Absorb SIEM & SOAR?
XDR is reshaping cybersecurity by unifying and enhancing SIEM and SOAR capabilities into a single platform. It addresses alert fatigue, improves incident correlation, simplifies operations, and enhances efficiency for SOC teams. This article has been indexed from Trend Micro Research,…
Lumma Stealer’s GitHub-Based Delivery Explored via Managed Detection and Response
The Managed XDR team investigated a sophisticated campaign distributing Lumma Stealer through GitHub, where attackers leveraged the platform’s release infrastructure to deliver malware such as SectopRAT, Vidar, and Cobeacon. This article has been indexed from Trend Micro Research, News and…
ASRM: A New Pillar for Cyber Insurance Underwriting
ASRM transforms cyber insurance underwriting by integrating real-time risk assessments, advanced tools (NDR, EDR, Cloud Security, MDR), and proactive mitigation strategies to improve accuracy, reduce claims, and build trust. This article has been indexed from Trend Micro Research, News and…
Trend Micro and CISA Secure-By-Design Pledge
Trend’s support reaffirms dedication to safeguarding products and customers This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Trend Micro and CISA Secure-By-Design Pledge
Invisible Prompt Injection: A Threat to AI Security
This article explains the invisible prompt injection, including how it works, an attack scenario, and how users can protect themselves. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Invisible Prompt Injection: A…
IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024
Since the end of 2024, we have been continuously monitoring large-scale DDoS attacks orchestrated by an IoT botnet exploiting vulnerable IoT devices such as wireless routers and IP cameras. This article has been indexed from Trend Micro Research, News and…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
How Cracks and Installers Bring Malware to Your Device
Our research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data. This article has been indexed from Trend Micro Research, News and Perspectives Read…
Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit
Our blog entry discusses a fake PoC exploit for LDAPNightmare (CVE-2024-49113) that is being used to distribute information-stealing malware. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Information Stealer Masquerades as LDAPNightmare…
Trend Micro Contributes and Maps Container Security to MITRE ATT&CK: A Game-Changer for Cyber Defense
Trend Micro leads the way by mapping its Container Security detection capabilities to the MITRE ATT&CK framework for Containers and contributing real-world attack data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article:…
What We Know About CVE-2024-49112 and CVE-2024-49113
This blog entry provides an overview of CVE-2024-49112 and CVE-2024-49113 and includes information that IT and SOC professionals need to know to stay protected against possible exploitation. This article has been indexed from Trend Micro Research, News and Perspectives Read…
AI Pulse: Top AI Trends from 2024 – A Look Back
In this edition of AI Pulse, let’s look back at top AI trends from 2024 in the rear view so we can more clearly predicts AI trends for 2025 and beyond. This article has been indexed from Trend Micro Research,…
Python-Based NodeStealer Version Targets Facebook Ads Manager
In this blog entry, Trend Micro’s Managed XDR team discuss their investigation into how the latest variant of NodeStealer is delivered through spear-phishing attacks, potentially leading to malware execution, data theft, and the exfiltration of sensitive information via Telegram. This…
Link Trap: GenAI Prompt Injection Attack
Prompt injection exploits vulnerabilities in generative AI to manipulate its behavior, even without extensive permissions. This attack can expose sensitive data, making awareness and preventive measures essential. Learn how it works and how to stay protected. This article has been…
Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion
In this blog entry, we discuss a social engineering attack that tricked the victim into installing a remote access tool, triggering DarkGate malware activities and an attempted C&C connection. This article has been indexed from Trend Micro Research, News and…
INTERPOL & Trend’s Fight Against Cybercrime
Trend threat intelligence and training were crucial to the success of two major policing operations in 2024 This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: INTERPOL & Trend’s Fight Against Cybercrime
MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks
Trend Micro’s monitoring of the MOONSHINE exploit kit revealed how it’s used by the threat actor Earth Minotaur to exploit Android messaging app vulnerabilities and install the DarkNimbus backdoor for surveillance. This article has been indexed from Trend Micro Research,…
The Road to Agentic AI: Exposed Foundations
Our research into Retrieval Augmented Generation (RAG) systems uncovered at least 80 unprotected servers. We highlight this problem, which can lead to potential data loss and unauthorized access. This article has been indexed from Trend Micro Research, News and Perspectives…
5 AI Security Takeaways featuring Forrester
Highlights from the recent discussion between Trend Micro’s David Roth, CRO Enterprise America, and guest speaker Jeff Pollard, VP, Principal Analyst, Forrester about AI hype versus reality and how to secure AI in the workplace. This article has been indexed…
Trend Micro and Japanese Partners Reveal Hidden Connections Among SEO Malware Operations
Trend Micro researchers, in collaboration with Japanese authorities, analyzed links between SEO malware families used in SEO poisoning attacks that lead users to fake shopping sites. This article has been indexed from Trend Micro Research, News and Perspectives Read the…
Breaking Down Earth Estries’ Persistent TTPs in Prolonged Cyber Operations
Discover how Earth Estries employs a diverse set of tactics, techniques, and tools, including malware such as Zingdoor and Snappybee, for its campaigns. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Breaking…
SOC Around the Clock: World Tour Survey Findings
Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what SOC teams had to say. This article has been indexed from Trend…
AI Pulse: Election Deepfakes, Disasters, Scams & more
In the final weeks before November’s U.S. election, cybersecurity experts were calling October 2024 the “month of mischief”—a magnet for bad actors looking to disrupt the democratic process through AI-generated misinformation. This issue of AI Pulse looks at what can…
Attacker Abuses Victim Resources to Reap Rewards from Titan Network
In this blog entry, we discuss how an attacker took advantage of the Atlassian Confluence vulnerability CVE-2023-22527 to connect servers to the Titan Network for cryptomining purposes. This article has been indexed from Trend Micro Research, News and Perspectives Read…