An analysis of the Gentlemen ransomware group, which employs advanced, adaptive tactics, techniques, and procedure to target critical industries worldwide. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Unmasking The Gentlemen Ransomware:…
Tag: Trend Micro Research, News and Perspectives
An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via ‘Cracked’ Apps
Trend™ Research analyzed a campaign distributing Atomic macOS Stealer (AMOS), a malware family targeting macOS users. Attackers disguise the malware as “cracked” versions of legitimate apps, luring users into installation. This article has been indexed from Trend Micro Research, News…
Operation Serengeti 2.0: Trend Micro Helps Law Enforcement Fight Cybercrime in Africa
Operation Serengeti 2.0: With Trend Micro’s support, INTERPOL led a major crackdown across Africa, arresting cybercriminals, dismantling infrastructures, recovering illicit funds, and protecting tens of thousands of victims. This article has been indexed from Trend Micro Research, News and Perspectives…
TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents
The TAOTH campaign exploited abandoned software and spear-phishing to deploy multiple malware families, targeting dissidents and other high-value individuals across Eastern Asia. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: TAOTH Campaign…
Leadership, Innovation, and the Future of AI: Lessons from Trend Micro CEO & Co-Founder Eva Chen
Discover how AI is reshaping cybersecurity through our CEO, Eva Chen’s industry briefing series. Gain practical strategies, real-world insights, and a clear roadmap to secure your AI initiatives with confidence. This article has been indexed from Trend Micro Research, News…
Warlock: From SharePoint Vulnerability Exploit to Enterprise Ransomware
Warlock ransomware exploits unpatched Microsoft SharePoint vulnerabilities to gain access, escalate privileges, steal credentials, move laterally, and deploy ransomware with data exfiltration across enterprise environments. This article has been indexed from Trend Micro Research, News and Perspectives Read the original…
Crypto24 Ransomware Group Blends Legitimate Tools with Custom Malware for Stealth Attacks
Crypto24 is a ransomware group that stealthily blends legitimate tools with custom malware, using advanced evasion techniques to bypass security and EDR technologies. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Crypto24…
New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises
We uncovered Charon, a new ransomware strainfamily that uses advanced APT-style techniques, including DLL sideloading, process injection, and anti-EDR capabilities, to target organizations with customized ransom demands. This article has been indexed from Trend Micro Research, News and Perspectives Read…
New Ransomware Charon Uses Earth Baxia APT Techniques To Target Enterprises
We uncovered Charon, a new ransomware strainfamily that uses advanced APT-style techniques, including DLL sideloading, process injection, and anti-EDR capabilities, to target organizations with customized ransom demands. This article has been indexed from Trend Micro Research, News and Perspectives Read…
Gunra Ransomware Group Unveils Efficient Linux Variant
This blog discusses how Gunra ransomware’s new Linux variant accelerates and customizes encryption, expanding the group’s reach with advanced cross-platform tactics. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Gunra Ransomware Group…
Gunra Ransomware Group Unveils Efficient Linux Variant
This blog discusses how Gunra ransomware’s new Linux variant accelerates and customizes encryption, expanding the group’s reach with advanced cross-platform tactics. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Gunra Ransomware Group…
Revisiting UNC3886 Tactics to Defend Against Present Risk
We examine the past tactics used by UNC3886 to gain insight on how to best strengthen defenses against the ongoing and emerging threats of this APT group. This article has been indexed from Trend Micro Research, News and Perspectives Read…
Proactive Email Security: The Power of AI
Lead with AI-powered email security to stay ahead of attackers and personalize user interaction at every touchpoint, bridging technology and behavior with precision. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Proactive…
Back to Business: Lumma Stealer Returns with Stealthier Methods
Lumma Stealer has re-emerged shortly after its takedown. This time, the cybergroup behind this malware appears to be intent on employing more covert tactics while steadily expanding its reach. This article shares the latest methods used to propagate this threat.…
Proactive Security and Insights for SharePoint Attacks (CVE-2025-53770 and CVE-2025-53771)
CVE-2025-53770 and CVE-2025-53771 are vulnerabilities in on-premise Microsoft SharePoint Servers that evolved from previously patched flaws, allowing unauthenticated remote code execution through advanced deserialization and ViewState abuse. This article has been indexed from Trend Micro Research, News and Perspectives Read…
Proactive Security and Insights for SharePoint Attacks (CVE-2025-53770 and CVE-2025-53771)
CVE-2025-53770 and CVE-2025-53771 are vulnerabilities in on-premise Microsoft SharePoint Servers that evolved from previously patched flaws, allowing unauthenticated remote code execution through advanced deserialization and ViewState abuse. This article has been indexed from Trend Micro Research, News and Perspectives Read…
Securing Tomorrow: An Interview with Trend Micro VP of Product Management Michael Habibi
Proactive security in a rapidly evolving threat landscape This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Securing Tomorrow: An Interview with Trend Micro VP of Product Management Michael Habibi
CISA’s NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security
This blog explores key findings from CISA’s NIMBUS 2000 Cloud Identity Security Technical Exchange and how Trend Vision One™ Cloud Security aligns with these priorities. It highlights critical challenges in token validation, secrets management, and logging visibility—offering insights into how…
CISA’s NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security
This blog explores key findings from CISA’s NIMBUS 2000 Cloud Identity Security Technical Exchange and how Trend Vision One™ Cloud Security aligns with these priorities. It highlights critical challenges in token validation, secrets management, and logging visibility—offering insights into how…
Preventing Zero-Click AI Threats: Insights from EchoLeak
A zero-click exploit called EchoLeak reveals how AI assistants like Microsoft 365 Copilot can be manipulated to leak sensitive data without user interaction. This entry breaks down how the attack works, why it matters, and what defenses are available to…