CVE-2025-53770 and CVE-2025-53771 are vulnerabilities in on-premise Microsoft SharePoint Servers that evolved from previously patched flaws, allowing unauthenticated remote code execution through advanced deserialization and ViewState abuse. This article has been indexed from Trend Micro Research, News and Perspectives Read…
Tag: Trend Micro Research, News and Perspectives
Proactive Security and Insights for SharePoint Attacks (CVE-2025-53770 and CVE-2025-53771)
CVE-2025-53770 and CVE-2025-53771 are vulnerabilities in on-premise Microsoft SharePoint Servers that evolved from previously patched flaws, allowing unauthenticated remote code execution through advanced deserialization and ViewState abuse. This article has been indexed from Trend Micro Research, News and Perspectives Read…
Securing Tomorrow: An Interview with Trend Micro VP of Product Management Michael Habibi
Proactive security in a rapidly evolving threat landscape This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Securing Tomorrow: An Interview with Trend Micro VP of Product Management Michael Habibi
CISA’s NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security
This blog explores key findings from CISA’s NIMBUS 2000 Cloud Identity Security Technical Exchange and how Trend Vision One™ Cloud Security aligns with these priorities. It highlights critical challenges in token validation, secrets management, and logging visibility—offering insights into how…
CISA’s NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security
This blog explores key findings from CISA’s NIMBUS 2000 Cloud Identity Security Technical Exchange and how Trend Vision One™ Cloud Security aligns with these priorities. It highlights critical challenges in token validation, secrets management, and logging visibility—offering insights into how…
Preventing Zero-Click AI Threats: Insights from EchoLeak
A zero-click exploit called EchoLeak reveals how AI assistants like Microsoft 365 Copilot can be manipulated to leak sensitive data without user interaction. This entry breaks down how the attack works, why it matters, and what defenses are available to…
BERT Ransomware Group Targets Asia and Europe on Multiple Platforms
BERT is a newly emerged ransomware group that pairs simple code with effective execution—carrying out attacks across Europe and Asia. In this entry, we examine the group’s tactics, how their variants have evolved, and the tools they use to get…
Why Trend Micro Continues to be Named a CNAPP Leader
Trend Micro is recognized for our Cloud CNAPP capabilities and product strategy—affirming our vision to deliver a cloud security solution that predicts, protects, and responds to threats across hybrid and multi-cloud environments. This article has been indexed from Trend Micro…
Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI Agent
A single SQL injection bug in Anthropic’s SQLite MCP server—forked over 5,000 times—can seed stored prompts, exfiltrate data, and hand attackers the keys to entire agent workflows. This entry unpacks the attack chain and lays out concrete fixes to shut…
Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI Agent
A single SQL injection bug in Anthropic’s SQLite MCP server—forked over 5,000 times—can seed stored prompts, exfiltrate data, and hand attackers the keys to entire agent workflows. This entry unpacks the attack chain and lays out concrete fixes to shut…
Enabling Secure AI Inference: Trend Cybertron Leverages NVIDIA Universal LLM NIM Microservices
Learn how Trend’s Cybertron has been harnessing the power of NVIDIA Universal LLM NIM Microservices. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Enabling Secure AI Inference: Trend Cybertron Leverages NVIDIA Universal…
Keeping Pace and Embracing Emerging Technologies
Trend Micro and the NEOM McLaren Formula E Team stay ahead of the curve by embracing new technologies, fostering a no-blame culture, and making split-second decisions in high-stakes environments. This article has been indexed from Trend Micro Research, News and…
NEOM McLaren Formula E Team & Trend Micro Innovation History
Explore how innovation becomes a team sport when Trend Micro and the NEOM McLaren Formula E Team leaders come together to talk culture, risk, and forward thinking. This article has been indexed from Trend Micro Research, News and Perspectives Read…
Driving Success on the Track or in the Boardroom
Discover how the Trend Micro and the NEOM McLaren Formula E Team partnership is powered by a common vision for winning, on the track and in the boardroom. This article has been indexed from Trend Micro Research, News and Perspectives…
Trend Micro Leading the Fight to Secure AI
New MITRE ATLAS submission helps strengthen organizations’ cyber resilience This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Trend Micro Leading the Fight to Secure AI
Earth Lamia Develops Custom Arsenal to Target Multiple Industries
Trend™ Research has been tracking an active APT threat actor named Earth Lamia, targeting multiple industries in Brazil, India and Southeast Asia countries at least since 2023. The threat actor primarily exploits vulnerabilities in web applications to gain access to…
Earth Lamia Develops Custom Arsenal to Target Multiple Industries
Trend™ Research has been tracking an active APT threat actor named Earth Lamia, targeting multiple industries in Brazil, India and Southeast Asia countries at least since 2023. The threat actor primarily exploits vulnerabilities in web applications to gain access to…
Trend Joins NVIDIA to Secure AI Infrastructure with NVIDIA
Together, we are focused on securing the full AI lifecycle—from development and training to deployment and inference—across cloud, data center, and AI factories. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Trend…
Trend Micro Puts a Spotlight on AI at Pwn2Own Berlin
Get a sneak peak into how Trend Micro’s Pwn2Own Berlin 2025 is breaking new ground, focusing on AI infrastructure and finding the bugs to proactively safeguard the future of computing. This article has been indexed from Trend Micro Research, News…
Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan
Trend™ Research discusses the evolving tradecraft of threat actor Earth Ammit, proven by the advanced toolset used in its TIDRONE and VENOM campaigns that targeted the drone supply chain. This article has been indexed from Trend Micro Research, News and…