US - Research, News, and Perspectives
http://feed.informer.com/digests/G5HRN3DTV4/feeder
US - Research, News, and PerspectivesRespective post owners and feed distributorsTue, 09 Nov 2021 16:45:03 +0000Feed Informer http://feed.informer.com/Capacity is Critical in Riskier Threat Landscape
https://www.trendmicro.com/en_us/research/25/d/threat-landscape-capacity.html
Research, News, and Perspective
urn:uuid:8508da8d-687e-5dce-b6b7-88b4a8bbae82Fri, 04 Apr 2025 00:00:00 +0000International cooperation, reporting, and capacity building are critical to enhance cybersecurity defenses. Effective governance in an increasingly risky landscape requires visibility as well as coordinated vulnerability disclosure.Trend Micro Research : CloudTrend Micro Research : Compliance & RisksTrend Micro Research : Artificial Intelligence (AI)Trend Micro Research : Expert PerspectiveTrend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsAI TeamThe Espionage Toolkit of Earth Alux: A Closer Look at its Advanced Techniques
https://www.trendmicro.com/en_us/research/25/c/the-espionage-toolkit-of-earth-alux.html
Research, News, and Perspective
urn:uuid:dc7673d8-4c1b-d705-3d1d-cdd764f403a7Mon, 31 Mar 2025 00:00:00 +0000The cyberespionage techniques of Earth Alux, a China-linked APT group, are putting critical industries at risk. The attacks, aimed at the APAC and Latin American regions, leverage powerful tools and techniques to remain hidden while stealing sensitive data.Trend Micro Research : APT & Targeted AttacksTrend Micro Research : EndpointsTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsLenart BermejoA Deep Dive into Water Gamayun’s Arsenal and Infrastructure
https://www.trendmicro.com/en_us/research/25/c/deep-dive-into-water-gamayun.html
Research, News, and Perspective
urn:uuid:a2d83c91-def5-0b09-595e-1d006d93ed54Fri, 28 Mar 2025 00:00:00 +0000Trend Research discusses the delivery methods, custom payloads, and techniques used by Water Gamayun, the suspected Russian threat actor abusing a zero-day vulnerability in the Microsoft Management Console framework (CVE-2025-26633) to execute malicious code on infected machines.Trend Micro Research : EndpointsTrend Micro Research : Exploits & VulnerabilitiesTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsAliakbar ZahraviTrend Cybertron: Full Platform or Open-Source?
https://www.trendmicro.com/en_us/research/25/c/cybertron-ai-security.html
Research, News, and Perspective
urn:uuid:f1990f0a-1a2f-862c-f1d9-6ec1d7bf2523Thu, 27 Mar 2025 00:00:00 +0000Previously exclusive to Trend Vision One customers, select Trend Cybertron models, datasets and agents are now available via open-source. Build advanced security solutions and join us in developing the next generation of AI security technology.Trend Micro Research : CloudTrend Micro Research : Latest NewsTrend Micro Research : WebTrend Micro Research : Connected CarTrend Micro Research : PlatformTrend Micro Research : EndpointsTrend Micro Research : TM Vision One PlatformTrend Micro Research : Articles, News, ReportsTrend Micro Research : Social MediaTrend Micro Research : Smart HomeTrend Micro Research : ASRMTrend Micro Research : Data centerTrend Micro Research : ICS OTTrend Micro Research : IoTTrend Micro Research : MobileTrend Micro Research : NetworkDave McDuffTrend Micro & IBM Team Up To Boost Mainframe Security
https://www.trendmicro.com/en_us/research/25/c/boost-mainframe-security.html
Research, News, and Perspective
urn:uuid:f59e664c-c952-944b-b072-7883b7b8e217Thu, 27 Mar 2025 00:00:00 +0000Trend Micro Deep Security adds security for mainframe enterprise integrationTrend Micro Research : CloudTrend Micro Research : Latest NewsTrend Micro Research : Compliance & RisksTrend Micro Research : Articles, News, ReportsTrend Micro Research : Data centerAlbabat Ransomware Group Potentially Expands Targets to Multiple OS, Uses GitHub to Streamline Operations
https://www.trendmicro.com/en_us/research/25/c/albabat-ransomware-group.html
Research, News, and Perspective
urn:uuid:1deccbab-21fa-5c36-5278-8cc5033cbc17Fri, 21 Mar 2025 00:00:00 +0000Trend Research encounters new versions of the Albabat ransomware, which appears to target Windows, Linux, and macOS devices. We also reveal the group’s use of GitHub to streamline their ransomware operation.Trend Micro Research : EndpointsTrend Micro Research : RansomwareTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsNathaniel MoralesZDI-CAN-25373: Windows Shortcut Exploit Abused as Zero-Day in Widespread APT Campaigns
https://www.trendmicro.com/en_us/research/25/c/windows-shortcut-zero-day-exploit.html
Research, News, and Perspective
urn:uuid:8714d1f4-0dab-9114-e42d-b332dbbf3c2dTue, 18 Mar 2025 00:00:00 +0000Trend Zero Day Initiative™ (ZDI) uncovered both state-sponsored and cybercriminal groups extensively exploiting ZDI-CAN-25373 (aka ZDI-25-148), a Windows .lnk file vulnerability that enables hidden command execution.Trend Micro Research : EndpointsTrend Micro Research : Exploits & VulnerabilitiesTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsPeter GirnusSocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware
https://www.trendmicro.com/en_us/research/25/c/socgholishs-intrusion-techniques-facilitate-distribution-of-rans.html
Research, News, and Perspective
urn:uuid:9b8c4fc2-34b3-6363-fef1-fe478bdf5846Fri, 14 Mar 2025 00:00:00 +0000Trend Research analyzed SocGholish’s MaaS framework and its role in deploying RansomHub ransomware through compromised websites, using highly obfuscated JavaScript loaders to evade detection and execute various malicious tasks.Trend Micro Research : MalwareTrend Micro Research : EndpointsTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsAdam O'ConnorAI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution
https://www.trendmicro.com/en_us/research/25/c/ai-assisted-fake-github-repositories.html
Research, News, and Perspective
urn:uuid:c51982da-fcf2-5023-8a1d-48319ef870faTue, 11 Mar 2025 00:00:00 +0000In this blog entry, we uncovered a campaign that uses fake GitHub repositories to distribute SmartLoader, which is then used to deliver Lumma Stealer and other malicious payloads. The campaign leverages GitHub’s trusted reputation to evade detection, using AI-generated content to make fake repositories appear legitimate.Trend Micro Research : EndpointsTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsCj Arsley MateoFrom Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario
https://www.trendmicro.com/en_us/research/25/c/from-event-to-insight.html
Research, News, and Perspective
urn:uuid:bda21144-e6f1-939b-937b-1a8844d92521Wed, 05 Mar 2025 00:00:00 +0000Trend Micro™ Managed XDR assisted in an investigation of a B2B BEC attack that unveiled an entangled mesh weaved by the threat actor with the help of a compromised server, ensnaring three business partners in a scheme that spanned for days. This article features investigation insights, a proposed incident timeline, and recommended security practices.Trend Micro Research : WebTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsJay Yaneza Exploiting DeepSeek-R1: Breaking Down Chain of Thought Security
https://www.trendmicro.com/en_us/research/25/c/exploiting-deepseek-r1.html
Research, News, and Perspective
urn:uuid:9b08f94f-51e0-28e8-6e1d-f14284041950Tue, 04 Mar 2025 00:00:00 +0000This entry explores how the Chain of Thought reasoning in the DeepSeek-R1 AI model can be susceptible to prompt attacks, insecure output generation, and sensitive data theft.
Trend Micro Research : ResearchTrend Micro Research : Artificial Intelligence (AI)Trend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber RiskTrend Micro Research : Cyber ThreatsTrent HolmesBlack Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal
https://www.trendmicro.com/en_us/research/25/b/black-basta-cactus-ransomware-backconnect.html
Research, News, and Perspective
urn:uuid:05bb0114-5917-e495-332e-e6e5a21cd2ffMon, 03 Mar 2025 00:00:00 +0000In this blog entry, we discuss how the Black Basta and Cactus ransomware groups utilized the BackConnect malware to maintain persistent control and exfiltrate sensitive data from compromised machines.Trend Micro Research : Latest NewsTrend Micro Research : MalwareTrend Micro Research : RansomwareTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsCatherine LoveriaUpdated Shadowpad Malware Leads to Ransomware Deployment
https://www.trendmicro.com/en_us/research/25/b/updated-shadowpad-malware-leads-to-ransomware-deployment.html
Research, News, and Perspective
urn:uuid:c393e3c4-4e87-1e44-e2c0-bf3e1173b2baThu, 20 Feb 2025 00:00:00 +0000In this blog, we discuss about how Shadowpad is being used to deploy a new undetected ransomware family. They deploy the malware exploiting weak passwords and bypassing multi-factor authenticationTrend Micro Research : MalwareTrend Micro Research : EndpointsTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsDaniel LunghiEarth Preta Mixes Legitimate and Malicious Components to Sidestep Detection
https://www.trendmicro.com/en_us/research/25/b/earth-preta-mixes-legitimate-and-malicious-components-to-sidestep-detection.html
Research, News, and Perspective
urn:uuid:c5720b0c-196b-4c49-0977-4013a70d888aTue, 18 Feb 2025 00:00:00 +0000Our Threat Hunting team discusses Earth Preta’s latest technique, in which the APT group leverages MAVInject and Setup Factory to deploy payloads, bypass ESET antivirus, and maintain control over compromised systems.Trend Micro Research : Latest NewsTrend Micro Research : Articles, News, ReportsTrend Micro Research : ResearchNathaniel MoralesChinese-Speaking Group Manipulates SEO with BadIIS
https://www.trendmicro.com/en_us/research/25/b/chinese-speaking-group-manipulates-seo-with-badiis.html
Research, News, and Perspective
urn:uuid:66269b3d-b8ec-2f63-5a65-5d5cd840d996Fri, 07 Feb 2025 00:00:00 +0000This blog post details our analysis of an SEO manipulation campaign targeting Asia. We also share recommendations that can help enterprises proactively secure their environment.Trend Micro Research : MalwareTrend Micro Research : WebTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsTed LeeCVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks
https://www.trendmicro.com/en_us/research/25/a/cve-2025-0411-ukrainian-organizations-targeted.html
Research, News, and Perspective
urn:uuid:d7fcc4f4-6b09-2e0c-6276-e90accf96a5bTue, 04 Feb 2025 00:00:00 +0000The Trend ZDI team offers an analysis on how CVE-2025-0411, a zero-day vulnerability in 7-Zip, was actively exploited to target Ukrainian organizations in a SmokeLoader campaign involving homoglyph attacks.Trend Micro Research : APT & Targeted AttacksTrend Micro Research : EndpointsTrend Micro Research : Exploits & VulnerabilitiesTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsPeter GirnusNative Sensors vs. Integrations for XDR Platforms?
https://www.trendmicro.com/en_us/research/25/b/native-sensors-integrations-xdr-platform.html
Research, News, and Perspective
urn:uuid:1c5621d3-1218-6ee1-1a70-0489dc8bde01Mon, 03 Feb 2025 00:00:00 +0000Native sensors vs. integrations in XDR: Native sensors offer faster deployment, real-time detection, and deeper visibility, while integrations may add complexity and delays. Learn how to optimize your XDR strategy for improved security.Trend Micro Research : EndpointsTrend Micro Research : Articles, News, ReportsTrend Micro Research : Expert PerspectiveChris LaFleurFuture of Cybersecurity: Will XDR Reshape SIEM & SOAR?
https://www.trendmicro.com/en_us/research/25/a/xdr-siem-soar.html
Research, News, and Perspective
urn:uuid:5e37d4ee-abd3-8f3a-276a-ce3f4592b9a9Fri, 31 Jan 2025 00:00:00 +0000XDR is reshaping cybersecurity by unifying and enhancing SIEM and SOAR capabilities into a single platform. It addresses alert fatigue, improves incident correlation, simplifies operations, and enhances efficiency for SOC teams.Trend Micro Research : CloudTrend Micro Research : Cyber CrimeTrend Micro Research : Expert PerspectiveTrend Micro Research : Cyber ThreatsTrend Micro Research : Compliance & RisksTrend Micro Research : EndpointsTrend Micro Research : NetworkTrend Micro Research : Articles, News, ReportsChris LaFleurLumma Stealer’s GitHub-Based Delivery Explored via Managed Detection and Response
https://www.trendmicro.com/en_us/research/25/a/lumma-stealers-github-based-delivery-via-mdr.html
Research, News, and Perspective
urn:uuid:548f2f59-b0d4-bfbf-f9c2-d87d6d5fa291Thu, 30 Jan 2025 00:00:00 +0000The Managed XDR team investigated a sophisticated campaign distributing Lumma Stealer through GitHub, where attackers leveraged the platform's release infrastructure to deliver malware such as SectopRAT, Vidar, and Cobeacon.Trend Micro Research : MalwareTrend Micro Research : EndpointsTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsBuddy TancioNDR: Not Just a "Nice to Have" Anymore
https://www.trendmicro.com/en_us/research/25/a/network-detection-response-ndr.html
Research, News, and Perspective
urn:uuid:1c344145-0371-acfb-8495-34000816ae77Thu, 30 Jan 2025 00:00:00 +0000Network Detection and Response (NDR) is no longer a 'nice-to-have'—it’s essential. NDR complements EDR, accelerates incident response, and enhances visibility, making it a critical tool for modern cybersecurity strategies and service providers.Trend Micro Research : CloudTrend Micro Research : Cyber CrimeTrend Micro Research : Expert PerspectiveTrend Micro Research : Cyber ThreatsTrend Micro Research : Compliance & RisksTrend Micro Research : EndpointsTrend Micro Research : NetworkTrend Micro Research : Articles, News, ReportsChris LaFleurASRM: A New Pillar for Cyber Insurance Underwriting
https://www.trendmicro.com/en_us/research/25/a/asrm-cyber-insurance-underwriting.html
Research, News, and Perspective
urn:uuid:421c88ba-1b6b-31d3-53a8-a881cdd0549fWed, 29 Jan 2025 00:00:00 +0000ASRM transforms cyber insurance underwriting by integrating real-time risk assessments, advanced tools (NDR, EDR, Cloud Security, MDR), and proactive mitigation strategies to improve accuracy, reduce claims, and build trust.Trend Micro Research : CloudTrend Micro Research : Cyber CrimeTrend Micro Research : Expert PerspectiveTrend Micro Research : Cyber ThreatsTrend Micro Research : Compliance & RisksTrend Micro Research : EndpointsTrend Micro Research : NetworkTrend Micro Research : Articles, News, ReportsChris LaFleurTrend Micro and CISA Secure-By-Design Pledge
https://www.trendmicro.com/en_us/research/25/a/cisa-secure-design-pledge.html
Research, News, and Perspective
urn:uuid:cbe9de5f-457d-1034-c63f-0b1f3b8dc323Thu, 23 Jan 2025 00:00:00 +0000Trend’s support reaffirms dedication to safeguarding products and customersTrend Micro Research : CloudTrend Micro Research : Compliance & RisksTrend Micro Research : Security StrategiesTrend Micro Research : Articles, News, ReportsInvisible Prompt Injection: A Threat to AI Security
https://www.trendmicro.com/en_us/research/25/a/invisible-prompt-injection-secure-ai.html
Research, News, and Perspective
urn:uuid:82ec137d-6724-576d-02bd-64a68c66e576Wed, 22 Jan 2025 00:00:00 +0000This article explains the invisible prompt injection, including how it works, an attack scenario, and how users can protect themselves.Trend Micro Research : CloudTrend Micro Research : Cyber CrimeTrend Micro Research : Expert PerspectiveTrend Micro Research : Cyber ThreatsTrend Micro Research : EndpointsTrend Micro Research : Artificial Intelligence (AI)Trend Micro Research : Articles, News, ReportsIan Ch LiuIoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024
https://www.trendmicro.com/en_us/research/25/a/iot-botnet-linked-to-ddos-attacks.html
Research, News, and Perspective
urn:uuid:91d24361-10d0-6233-7629-11a5f89bf93dFri, 17 Jan 2025 00:00:00 +0000Since the end of 2024, we have been continuously monitoring large-scale DDoS attacks orchestrated by an IoT botnet exploiting vulnerable IoT devices such as wireless routers and IP cameras.Trend Micro Research : MalwareTrend Micro Research : IoTTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsTrend Micro ResearchInvestigating A Web Shell Intrusion With Trend Micro™ Managed XDR
https://www.trendmicro.com/en_us/research/25/a/investigating-a-web-shell-intrusion-with-trend-micro--managed-xd.html
Research, News, and Perspective
urn:uuid:422bf28a-7197-e34e-3f43-61e8c022c527Tue, 14 Jan 2025 00:00:00 +0000This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data.Trend Micro Research : Exploits & VulnerabilitiesTrend Micro Research : ResearchTrend Micro Research : Risk ManagementStephen CarberyWorld Tour Survey: Cloud Engineers Wrestle with Risk
https://www.trendmicro.com/en_us/research/25/a/world-tour-cybersecurity-survey-2024.html
Research, News, and Perspective
urn:uuid:1de15b2f-0429-e085-058f-8545156a0287Mon, 13 Jan 2025 00:00:00 +0000Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what cloud security engineers teams had to say.Trend Micro Research : CloudTrend Micro Research : Cyber CrimeTrend Micro Research : WebTrend Micro Research : ResearchTrend Micro Research : Cyber ThreatsTrend Micro Research : Compliance & RisksTrend Micro Research : NetworkTrend Micro Research : Articles, News, ReportsTrend Micro™ Managed XDR Analysis of Infection From Fake Installers and Cracks
https://www.trendmicro.com/en_us/research/25/a/how-cracks-and-installers-bring-malware-to-your-device.html
Research, News, and Perspective
urn:uuid:e0eb8943-e39a-7102-c821-f9d557360f85Fri, 10 Jan 2025 00:00:00 +0000Our research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data.Trend Micro Research : MalwareTrend Micro Research : EndpointsTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsRyan MaglaqueInformation Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit
https://www.trendmicro.com/en_us/research/25/a/information-stealer-masquerades-as-ldapnightmare-poc-exploit.html
Research, News, and Perspective
urn:uuid:88cd629c-96b7-2a43-29f3-af6fd1baa1abThu, 09 Jan 2025 00:00:00 +0000Our blog entry discusses a fake PoC exploit for LDAPNightmare (CVE-2024-49113) that is being used to distribute information-stealing malware.
Trend Micro Research : MalwareTrend Micro Research : EndpointsTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsSarah Pearl CamilingTrend Micro Contributes and Maps Container Security to MITRE ATT&CK: A Game-Changer for Cyber Defense
https://www.trendmicro.com/en_us/research/25/a/mitre-attack-container-security-detection.html
Research, News, and Perspective
urn:uuid:1a314c3c-b405-feed-5f44-0f44dcaf1ce8Tue, 07 Jan 2025 00:00:00 +0000Trend Micro leads the way by mapping its Container Security detection capabilities to the MITRE ATT&CK framework for Containers and contributing real-world attack data.Trend Micro Research : Articles, News, ReportsTrend Micro Research : ResearchTrend Micro Research : Cyber ThreatsBestin Koruthu2024 Perspective: The Ultimate re:Invent Recap
https://www.trendmicro.com/en_us/research/24/l/ultimate-aws-reinvent-2024-recap.html
Research, News, and Perspective
urn:uuid:dab011a3-92d4-a0b1-988b-f910e2e71805Tue, 07 Jan 2025 00:00:00 +0000Ashley & Danielle's Ultimate RecapTrend Micro Research : CloudTrend Micro Research : Compliance & RisksTrend Micro Research : Artificial Intelligence (AI)Trend Micro Research : Expert PerspectiveTrend Micro Research : Articles, News, ReportsAshley SavoieWhat We Know About CVE-2024-49112 and CVE-2024-49113
https://www.trendmicro.com/en_us/research/25/a/what-we-know-about-cve-2024-49112-and-cve-2024-49113.html
Research, News, and Perspective
urn:uuid:d3aced8c-edfa-9336-8be8-82fbdc827506Sat, 04 Jan 2025 00:00:00 +0000This blog entry provides an overview of CVE-2024-49112 and CVE-2024-49113 and includes information that IT and SOC professionals need to know to stay protected against possible exploitation.Trend Micro Research : ResearchTrend Micro Research : Exploits & VulnerabilitiesAI Pulse: Top AI Trends from 2024 - A Look Back
https://www.trendmicro.com/en_us/research/25/a/top-ai-trends-from-2024-review.html
Research, News, and Perspective
urn:uuid:ecf1f82c-bd5d-3e85-b7eb-7cd6f3f82060Fri, 03 Jan 2025 00:00:00 +0000In this edition of AI Pulse, let's look back at top AI trends from 2024 in the rear view so we can more clearly predicts AI trends for 2025 and beyond.Trend Micro Research : Social MediaTrend Micro Research : Expert PerspectiveTrend Micro Research : Cyber ThreatsTrend Micro Research : Compliance & RisksTrend Micro Research : EndpointsTrend Micro Research : Artificial Intelligence (AI)Trend Micro Research : NetworkTrend Micro Research : Articles, News, ReportsAI TeamPython-Based NodeStealer Version Targets Facebook Ads Manager
https://www.trendmicro.com/en_us/research/24/l/python-based-nodestealer.html
Research, News, and Perspective
urn:uuid:6d380b53-30d1-17da-2558-a878f0b619e3Thu, 19 Dec 2024 00:00:00 +0000In this blog entry, Trend Micro’s Managed XDR team discuss their investigation into how the latest variant of NodeStealer is delivered through spear-phishing attacks, potentially leading to malware execution, data theft, and the exfiltration of sensitive information via Telegram.Trend Micro Research : MalwareTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsAira MarceloFedRAMP ATO Boosts Zero Trust for Federal Agencies
https://www.trendmicro.com/en_us/research/24/l/fedramp-ato-zero-trust.html
Research, News, and Perspective
urn:uuid:0a91ae2c-f775-65ca-bdf9-8ed581fc7b84Thu, 19 Dec 2024 00:00:00 +0000Trend Vision One™ for Government has obtained a FedRAMP Authorization to Operate (ATO). This milestone enables Federal government customers to leverage Trend’s platform to rapidly stop adversaries and control their cybersecurity risk posture.Trend Micro Research : CloudTrend Micro Research : Latest NewsTrend Micro Research : Compliance & RisksTrend Micro Research : EndpointsTrend Micro Research : NetworkLink Trap: GenAI Prompt Injection Attack
https://www.trendmicro.com/en_us/research/24/l/genai-prompt-injection-attack-threat.html
Research, News, and Perspective
urn:uuid:ddace753-405c-ade3-7a00-13a35cdf9f5eTue, 17 Dec 2024 00:00:00 +0000 Prompt injection exploits vulnerabilities in generative AI to manipulate its behavior, even without extensive permissions. This attack can expose sensitive data, making awareness and preventive measures essential. Learn how it works and how to stay protected.Trend Micro Research : Exploits & VulnerabilitiesTrend Micro Research : Cyber ThreatsTrend Micro Research : Data centerTrend Micro Research : EndpointsTrend Micro Research : Artificial Intelligence (AI)Trend Micro Research : NetworkTrend Micro Research : Security StrategiesTrend Micro Research : Articles, News, ReportsJay LiaoEarth Koshchei Coopts Red Team Tools in Complex RDP Attacks
https://www.trendmicro.com/en_us/research/24/l/earth-koshchei.html
Research, News, and Perspective
urn:uuid:16304fea-7e82-4a6e-a3dd-db1a6b3709faTue, 17 Dec 2024 00:00:00 +0000APT group Earth Koshchei, suspected to be sponsored by the SVR, executed a large-scale rogue RDP campaign using spear-phishing emails, red team tools, and sophisticated anonymization techniques to target high-profile sectors.Trend Micro Research : Latest NewsTrend Micro Research : APT & Targeted AttacksTrend Micro Research : ResearchFeike HacquebordVishing via Microsoft Teams Facilitates DarkGate Malware Intrusion
https://www.trendmicro.com/en_us/research/24/l/darkgate-malware.html
Research, News, and Perspective
urn:uuid:bbca78ca-12a5-1156-d3e7-9cc32d5d4818Fri, 13 Dec 2024 00:00:00 +0000In this blog entry, we discuss a social engineering attack that tricked the victim into installing a remote access tool, triggering DarkGate malware activities and an attempted C&C connection.Trend Micro Research : Latest NewsTrend Micro Research : Cyber ThreatsTrend Micro Research : ResearchCatherine LoveriaINTERPOL & Trend's Fight Against Cybercrime
https://www.trendmicro.com/en_us/research/24/l/interpol-cybercrime.html
Research, News, and Perspective
urn:uuid:103c9f0c-36c3-971d-ab6a-c46a57742f9cThu, 12 Dec 2024 00:00:00 +0000Trend threat intelligence and training were crucial to the success of two major policing operations in 2024Trend Micro Research : CloudTrend Micro Research : Latest NewsTrend Micro Research : Cyber CrimeTrend Micro Research : Cyber ThreatsTrend Micro Research : InfographicJon ClayMITRE ATT&CK 2024 Results for Enterprise Security
https://www.trendmicro.com/en_us/research/24/l/mitre-attack-results-enterprise-security-2024.html
Research, News, and Perspective
urn:uuid:56007f7f-715e-eca5-15e2-ca757303c6e9Mon, 09 Dec 2024 00:00:00 +0000Enterprise 2024 will incorporate multiple, smaller emulations for a more nuanced and targeted evaluation of defensive capabilities. We’re excited to offer two distinct adversary focus areas: Ransomware targeting Windows and Linux, and the Democratic People's Republic of Korea's targeting macOS.Trend Micro Research : CloudTrend Micro Research : Exploits & VulnerabilitiesTrend Micro Research : ReportsTrend Micro Research : APT & Targeted AttacksTrend Micro Research : EndpointsTrend Micro Research : RansomwareTrend Micro Research : NetworkTrend Micro Research : Articles, News, ReportsMike GrodzkiMOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks
https://www.trendmicro.com/en_us/research/24/l/earth-minotaur.html
Research, News, and Perspective
urn:uuid:48059e43-12ed-69ea-594f-709baf195d26Thu, 05 Dec 2024 00:00:00 +0000Trend Micro’s monitoring of the MOONSHINE exploit kit revealed how it’s used by the threat actor Earth Minotaur to exploit Android messaging app vulnerabilities and install the DarkNimbus backdoor for surveillance. Trend Micro Research : APT & Targeted AttacksTrend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsJoseph C ChenThe Road to Agentic AI: Exposed Foundations
https://www.trendmicro.com/en_us/research/24/k/agentic-ai.html
Research, News, and Perspective
urn:uuid:8c2b6a12-3acb-f67d-f3c5-193a1942952cWed, 04 Dec 2024 00:00:00 +0000Our research into Retrieval Augmented Generation (RAG) systems uncovered at least 80 unprotected servers. We highlight this problem, which can lead to potential data loss and unauthorized access.Trend Micro Research : CloudTrend Micro Research : Artificial Intelligence (AI)Trend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsMorton SwimmerGafgyt Malware Broadens Its Scope in Recent Attacks
https://www.trendmicro.com/en_us/research/24/l/gafgyt-malware-targeting-docker-remote-api-servers.html
Research, News, and Perspective
urn:uuid:1cb1cca2-4b3e-e17b-8e55-89568f33f1c5Tue, 03 Dec 2024 00:00:00 +0000Our researchers identified threat actors exploiting misconfigured Docker servers to spread the Gafgyt malware. This threat traditionally targets IoT devices; this new tactic signals a change in its behavior.Trend Micro Research : CloudTrend Micro Research : MalwareTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsSunil BhartiWorld Tour Survey: IT Operations’ Hands-on Defense
https://www.trendmicro.com/en_us/research/24/l/world-tour-cybersecurity-survey-it-defense.html
Research, News, and Perspective
urn:uuid:c6ecebc0-0a0c-b45a-cbf0-cf2ed69fa6b0Mon, 02 Dec 2024 00:00:00 +0000Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what IT operations teams had to say.Trend Micro Research : Cyber CrimeTrend Micro Research : WebTrend Micro Research : ResearchTrend Micro Research : Cyber ThreatsTrend Micro Research : Compliance & RisksTrend Micro Research : EndpointsTrend Micro Research : NetworkTrend Micro Research : Articles, News, ReportsAI Configuration Best Practices to address AI Security Risks
https://www.trendmicro.com/en_us/research/24/k/ai-configuration-best-practices.html
Research, News, and Perspective
urn:uuid:bdf9bbba-2335-5903-5eea-8acfdd099314Mon, 02 Dec 2024 00:00:00 +0000AI usage is on the rise as many companies are adopting AI for productivity gains and creation of new business opportunities which provide value to their customers.Trend Micro Research : CloudTrend Micro Research : How ToTrend Micro Research : Artificial Intelligence (AI)Trend Micro Research : Privacy & RisksTrend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsJoy NgaruroAI Pulse: The Good from AI and the Promise of Agentic
https://www.trendmicro.com/en_us/research/24/l/good-agentic-ai.html
Research, News, and Perspective
urn:uuid:111ac01c-2bdf-2ea2-91cd-602c8e3907a4Sun, 01 Dec 2024 00:00:00 +0000The perils of AI get a lot of airtime, but what are the upsides? This issue of AI Pulse looks at some of the good AI can bring, from strengthening cybersecurity to driving health breakthroughs—and how the coming wave of agentic AI is going to take those possibilities to a whole new level.Trend Micro Research : Latest NewsTrend Micro Research : Cyber CrimeTrend Micro Research : WebTrend Micro Research : Cyber ThreatsTrend Micro Research : EndpointsTrend Micro Research : Artificial Intelligence (AI)Trend Micro Research : MobileTrend Micro Research : Articles, News, ReportsAI TeamGuess Who’s Back - The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024
https://www.trendmicro.com/en_us/research/24/k/return-of-anel-in-the-recent-earth-kasha-spearphishing-campaign.html
Research, News, and Perspective
urn:uuid:6f3236a8-4564-87c2-9860-6db0873c7b5cTue, 26 Nov 2024 00:00:00 +0000Trend Micro has identified a spear-phishing campaign active in Japan since June 2024. Evidence about the malware used by this campaign suggests this was part of a new operation by Earth Kasha.Trend Micro Research : APT & Targeted AttacksTrend Micro Research : EndpointsTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsHara HiroakiGame of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions
https://www.trendmicro.com/en_us/research/24/k/earth-estries.html
Research, News, and Perspective
urn:uuid:c74084d4-5fae-a65e-557f-c6528ab93863Mon, 25 Nov 2024 00:00:00 +0000Since 2023, APT group Earth Estries has aggressively targeted key industries globally with sophisticated techniques and new backdoors, like GHOSTSPIDER and MASOL RAT, for prolonged espionage operations. Trend Micro Research : Latest NewsTrend Micro Research : APT & Targeted AttacksTrend Micro Research : ResearchLeon M ChangEmbracing a Risk-Based Cybersecurity Approach With ASRM
https://www.trendmicro.com/en_us/research/22/d/proactive-cyber-risk-management-strategies.html
Research, News, and Perspective
urn:uuid:2d89872a-4877-b4bf-92fe-108aa1520b15Mon, 25 Nov 2024 00:00:00 +0000Explore how a risk-based cybersecurity approach is critical to proactively stopping dynamic, ever-evolving threatsTrend Micro Research : Cyber CrimeTrend Micro Research : Expert PerspectiveTrend Micro Research : Privacy & RisksTrend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsJuan Pablo CastroSpot the Difference: Earth Kasha's New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella
https://www.trendmicro.com/en_us/research/24/k/lodeinfo-campaign-of-earth-kasha.html
Research, News, and Perspective
urn:uuid:25548714-aaa2-d531-a4bc-cf505751165bTue, 19 Nov 2024 00:00:00 +0000LODEINFO is a malware used in attacks targeting mainly Japan since 2019. Trend Micro has been tracking the group as Earth Kasha. We have identified a new campaign connected to this group with significant updates to their strategy, tactics, and arsenals.Trend Micro Research : APT & Targeted AttacksTrend Micro Research : EndpointsTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsHara HiroakiInside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices
https://www.trendmicro.com/en_us/research/24/k/water-barghest.html
Research, News, and Perspective
urn:uuid:03389c34-df1d-28eb-b167-ec6bc11f7c51Mon, 18 Nov 2024 00:00:00 +0000In this blog entry, we discuss Water Barghest's exploitation of IoT devices, transforming them into profitable assets through advanced automation and monetization techniques.Trend Micro Research : Articles, News, ReportsTrend Micro Research : ThreatsTrend Micro Research : IoTFeike Hacquebord