This research is the result of our collaboration with the National Crime Agency in the United Kingdom, who took action against LockBit as part of Operation Cronos, an international effort resulting in the undermining of its operations. This article has…
Tag: Trend Micro Research, News and Perspectives
Decoding Digital Transformation: AI, ML, and RPA in the Modern Era
Explore the first article in this series about AI, ML, and RPA, which aims to demystify and explore the full spectrum of these core technologies. This article has been indexed from Trend Micro Research, News and Perspectives Read the original…
Earth Preta Campaign Uses DOPLUGS to Target Asia
In this blog entry, we focus on Earth Preta’s campaign that employed a variant of the DOPLUGS malware to target Asian countries. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Earth Preta…
Cyber Risk Management: Bring Security to the Boardroom
Discover how to strategically present security controls to the board to better manage cyber risk. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Cyber Risk Management: Bring Security to the Boardroom
CVE-2024-21412: Water Hydra Targets Traders with Microsoft Defender SmartScreen Zero-Day
The APT group Water Hydra has been exploiting the zero-day Microsoft Defender SmartScreen vulnerability (CVE-2024-21412) in its campaigns targeting financial market traders. This vulnerability, which has now been patched by Microsoft, was discovered and disclosed by the Trend Micro Zero…
SmartScreen Vulnerability: CVE-2024-21412 Facts and Fixes
This entry aims to provide additional context to CVE-2024-21412, how it can be used by threat actors, and how Trend protects customers from this specific vulnerability. This article has been indexed from Trend Micro Research, News and Perspectives Read the…
What Generative AI Means for Cybersecurity in 2024
After a full year of life with ChatGPT cybersecurity experts have a clearer sense of how criminals are using generative AI to enhance attacks – learn what generative AI means for cybersecurity in 2024. This article has been indexed from…
Unveiling Atlassian Confluence Vulnerability CVE-2023-22527: Understanding and Mitigating Remote Code Execution Risks
In this blog entry, we discuss CVE-2023-22527, a vulnerability in Atlassian Confluence that has a CVSS score of 10 and could allow threat actors to perform remote code execution. This article has been indexed from Trend Micro Research, News and…
Unifying Cloud Security Beyond Siloes
Attacks don’t stay in siloes, and neither should your security solutions. Explore the benefits of a cybersecurity platform that consolidates security across multiple layers—including the cloud—for more proactive risk management. This article has been indexed from Trend Micro Research, News…
Pawn Storm Uses Brute Force and Stealth Against High-Value Targets
Based on our estimates, from approximately April 2022 until November 2023, Pawn Storm attempted to launch NTLMv2 hash relay attacks through different methods, with huge peaks in the number of targets and variations in the government departments that it targeted.…
Prevent BEC with AI-Powered Email and Collaboration
Latest Trend Vision One™ platform integration addresses growing need for streamlined IT and security operations across email and messaging environments. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Prevent BEC with AI-Powered…
Kasseika Ransomware Deploys BYOVD Attacks, Abuses PsExec and Exploits Martini Driver
In this blog, we detail our investigation of the Kasseika ransomware and the indicators we found suggesting that the actors behind it have acquired access to the source code of the notorious BlackMatter ransomware. This article has been indexed from…
18X a Leader in Gartner Magic Quadrant for EPP
Explore why Trend Micro is recognized—for the 18th time—as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: 18X a Leader in…
Reduce Business Email Compromise with Collaboration
Here’s the latest Trend Vision One™ platform integration addressing the growing need for collaboration in business email security space. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Reduce Business Email Compromise with…
Embracing a risk-based cybersecurity approach with ASRM
Explore how a risk-based cybersecurity approach is critical to proactively stop dynamic, ever-evolving threats. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Embracing a risk-based cybersecurity approach with ASRM
CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign
This blog delves into the Phemedrone Stealer campaign’s exploitation of CVE-2023-36025, the Windows Defender SmartScreen Bypass vulnerability, for its defense evasion and investigates the malware’s payload. This article has been indexed from Trend Micro Research, News and Perspectives Read the…
Accelerating into 2024 with NEOM McLaren Formula E Team
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Accelerating into 2024 with NEOM McLaren Formula…
Build Cyber Resilience with Distributed Energy Systems
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Build Cyber Resilience with Distributed Energy Systems
3 Strategic Insights from Cybersecurity Leader Study
Explore the results of a Sapio Research survey commissioned by Trend Micro about how CISOs and other technology leaders are overcoming today’s biggest challenges. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article:…
Decoding CVE-2023-50164: Unveiling the Apache Struts File Upload Exploit
In this blog entry, we discuss the technical details of CVE-2023-50164, a critical vulnerability that affects Apache Struts 2 and enables unauthorized path traversal. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article:…