Trend Micro™ Managed XDR assisted in an investigation of a B2B BEC attack that unveiled an entangled mesh weaved by the threat actor with the help of a compromised server, ensnaring three business partners in a scheme that spanned for…
Tag: Trend Micro Research, News and Perspectives
Exploiting DeepSeek-R1: Breaking Down Chain of Thought Security
This entry explores how the Chain of Thought reasoning in the DeepSeek-R1 AI model can be susceptible to prompt attacks, insecure output generation, and sensitive data theft. This article has been indexed from Trend Micro Research, News and Perspectives Read…
Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal
In this blog entry, we discuss how the Black Basta and Cactus ransomware groups utilized the BackConnect malware to maintain persistent control and exfiltrate sensitive data from compromised machines. This article has been indexed from Trend Micro Research, News and…
Updated Shadowpad Malware Leads to Ransomware Deployment
In this blog, we discuss about how Shadowpad is being used to deploy a new undetected ransomware family. They deploy the malware exploiting weak passwords and bypassing multi-factor authentication This article has been indexed from Trend Micro Research, News and…
Earth Preta Mixes Legitimate and Malicious Components to Sidestep Detection
Our Threat Hunting team discusses Earth Preta’s latest technique, in which the APT group leverages MAVInject and Setup Factory to deploy payloads, bypass ESET antivirus, and maintain control over compromised systems. This article has been indexed from Trend Micro Research,…
Chinese-Speaking Group Manipulates SEO with BadIIS
This blog post details our analysis of an SEO manipulation campaign targeting Asia. We also share recommendations that can help enterprises proactively secure their environment. This article has been indexed from Trend Micro Research, News and Perspectives Read the original…
CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks
The ZDI team offers an analysis on how CVE-2025-0411, a zero-day vulnerability in 7-Zip, was actively exploited to target Ukrainian organizations in a SmokeLoader campaign involving homoglyph attacks. This article has been indexed from Trend Micro Research, News and Perspectives…
Native Sensors vs. Integrations for XDR Platforms?
Native sensors vs. integrations in XDR: Native sensors offer faster deployment, real-time detection, and deeper visibility, while integrations may add complexity and delays. Learn how to optimize your XDR strategy for improved security. This article has been indexed from Trend…
Future of Cybersecurity: Will XDR Absorb SIEM & SOAR?
XDR is reshaping cybersecurity by unifying and enhancing SIEM and SOAR capabilities into a single platform. It addresses alert fatigue, improves incident correlation, simplifies operations, and enhances efficiency for SOC teams. This article has been indexed from Trend Micro Research,…
Lumma Stealer’s GitHub-Based Delivery Explored via Managed Detection and Response
The Managed XDR team investigated a sophisticated campaign distributing Lumma Stealer through GitHub, where attackers leveraged the platform’s release infrastructure to deliver malware such as SectopRAT, Vidar, and Cobeacon. This article has been indexed from Trend Micro Research, News and…
ASRM: A New Pillar for Cyber Insurance Underwriting
ASRM transforms cyber insurance underwriting by integrating real-time risk assessments, advanced tools (NDR, EDR, Cloud Security, MDR), and proactive mitigation strategies to improve accuracy, reduce claims, and build trust. This article has been indexed from Trend Micro Research, News and…
Trend Micro and CISA Secure-By-Design Pledge
Trend’s support reaffirms dedication to safeguarding products and customers This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Trend Micro and CISA Secure-By-Design Pledge
Invisible Prompt Injection: A Threat to AI Security
This article explains the invisible prompt injection, including how it works, an attack scenario, and how users can protect themselves. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Invisible Prompt Injection: A…
IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024
Since the end of 2024, we have been continuously monitoring large-scale DDoS attacks orchestrated by an IoT botnet exploiting vulnerable IoT devices such as wireless routers and IP cameras. This article has been indexed from Trend Micro Research, News and…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Investigating A Web Shell Intrusion With…