US - Research, News, and Perspectives http://feed.informer.com/digests/G5HRN3DTV4/feeder US - Research, News, and Perspectives Respective post owners and feed distributors Tue, 09 Nov 2021 16:45:03 +0000 Feed Informer http://feed.informer.com/ Crypto24 Ransomware Group Blends Legitimate Tools with Custom Malware for Stealth Attacks https://www.trendmicro.com/en_us/research/25/h/crypto24-ransomware-stealth-attacks.html Research, News, and Perspective urn:uuid:2507d8e9-e309-1c36-c03e-e0dbd2b05675 Thu, 14 Aug 2025 00:00:00 +0000 Crypto24 is a ransomware group that stealthily blends legitimate tools with custom malware, using advanced evasion techniques to bypass security and EDR technologies. Trend Micro Research : Ransomware Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Maristel Policarpio New Ransomware Charon Uses Earth Baxia APT Techniques To Target Enterprises https://www.trendmicro.com/en_us/research/25/h/new-ransomware-charon.html Research, News, and Perspective urn:uuid:fef997ec-1074-266b-fa91-2f54a1ec43a2 Tue, 12 Aug 2025 00:00:00 +0000 We uncovered Charon, a new ransomware strainfamily that uses advanced APT-style techniques, including DLL sideloading, process injection, and anti-EDR capabilities, to target organizations with customized ransom demands. Trend Micro Research : Endpoints Trend Micro Research : Ransomware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Jacob Santos New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises https://www.trendmicro.com/en_us/research/25/h/new-ransomware-charon.html Research, News, and Perspective urn:uuid:f35223df-ffe3-4520-d2e5-70252997d48f Tue, 12 Aug 2025 00:00:00 +0000 We uncovered Charon, a new ransomware strainfamily that uses advanced APT-style techniques, including DLL sideloading, process injection, and anti-EDR capabilities, to target organizations with customized ransom demands. Trend Micro Research : Endpoints Trend Micro Research : Ransomware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Jacob Santos Gunra Ransomware Group Unveils Efficient Linux Variant https://www.trendmicro.com/en_us/research/25/g/gunra-ransomware-linux-variant.html Research, News, and Perspective urn:uuid:0ea9fc9b-3a67-f5d6-6b69-c40330bc34f5 Tue, 29 Jul 2025 00:00:00 +0000 This blog discusses how Gunra ransomware’s new Linux variant accelerates and customizes encryption, expanding the group’s reach with advanced cross-platform tactics. Trend Micro Research : Latest News Trend Micro Research : Ransomware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Jeffrey Francis Bonaobra Revisiting UNC3886 Tactics to Defend Against Present Risk https://www.trendmicro.com/en_us/research/25/g/revisiting-unc3886-tactics-to-defend-against-present-risk.html Research, News, and Perspective urn:uuid:76709681-f25c-5167-b621-326c03dcbcf2 Mon, 28 Jul 2025 00:00:00 +0000 We examine the past tactics used by UNC3886 to gain insight on how to best strengthen defenses against the ongoing and emerging threats of this APT group. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Articles, News, Reports Cj Arsley Mateo Unlocking the Power of Amazon Security Lake for Proactive Security https://www.trendmicro.com/en_us/research/25/g/amazon-security-lake-proactive-security.html Research, News, and Perspective urn:uuid:b6aab75a-7bad-2d89-b137-a89fa325db6b Mon, 28 Jul 2025 00:00:00 +0000 Security is a central challenge in modern application development and maintenance, requiring not just traditional practices but also a deep understanding of application architecture and data flow. While organizations now have access to rich data like logs and telemetry, the real challenge lies in translating this information into actionable insights. This article explores how leveraging those insights can help detect genuine security incidents and prevent their recurrence. Trend Micro Research : Cloud Trend Micro Research : Malware Trend Micro Research : How To Trend Micro Research : Phishing Trend Micro Research : Compliance & Risks Trend Micro Research : Ransomware Trend Micro Research : Cyber Risk Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Deep Web Trend Micro Research : Privacy & Risks Trend Micro Research : Cyber Threats Trend Micro Research : Risk Management Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Spam Felipe Costa Proactive Email Security: The Power of AI https://www.trendmicro.com/en_us/research/25/g/proactive-email-security.html Research, News, and Perspective urn:uuid:be0305bf-727b-99c9-bed1-4b2abfc15be9 Thu, 24 Jul 2025 00:00:00 +0000 Lead with AI-powered email security to stay ahead of attackers and personalize user interaction at every touchpoint, bridging technology and behavior with precision. Trend Micro Research : Articles, News, Reports Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Research Sara Atie Back to Business: Lumma Stealer Returns with Stealthier Methods https://www.trendmicro.com/en_us/research/25/g/lumma-stealer-returns.html Research, News, and Perspective urn:uuid:7d90d154-518a-768f-cb8e-566e1190db7d Tue, 22 Jul 2025 00:00:00 +0000 Lumma Stealer has re-emerged shortly after its takedown. This time, the cybergroup behind this malware appears to be intent on employing more covert tactics while steadily expanding its reach. This article shares the latest methods used to propagate this threat. Trend Micro Research : Endpoints Trend Micro Research : Malware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Junestherry Dela Cruz Securing Tomorrow: An Interview with Trend Micro VP of Product Management Michael Habibi https://www.trendmicro.com/en_us/research/25/g/endpoint-protection-epp-gartner-magic-quadrant-july-2025.html Research, News, and Perspective urn:uuid:9809ee2b-6ddd-9c6b-f2e4-d87a02cb4797 Thu, 17 Jul 2025 00:00:00 +0000 Proactive security in a rapidly evolving threat landscape Trend Micro Research : Endpoints Trend Micro Research : Articles, News, Reports Trend Micro Research : Reports CISA's NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security https://www.trendmicro.com/en_us/research/25/g/nimbus-2000-initiative-findings.html Research, News, and Perspective urn:uuid:28e1d626-bfbf-777c-41cc-688fdf3081c0 Wed, 16 Jul 2025 00:00:00 +0000 This blog explores key findings from CISA’s NIMBUS 2000 Cloud Identity Security Technical Exchange and how Trend Vision One™ Cloud Security aligns with these priorities. It highlights critical challenges in token validation, secrets management, and logging visibility—offering insights into how integrated security solutions can help organizations strengthen their cloud identity defenses and meet evolving federal standards. Trend Micro Research : Cloud Trend Micro Research : Articles, News, Reports Trend Micro Research : Expert Perspective Fernando Cardoso Preventing Zero-Click AI Threats: Insights from EchoLeak https://www.trendmicro.com/en_us/research/25/g/preventing-zero-click-ai-threats-insights-from-echoleak.html Research, News, and Perspective urn:uuid:0008ea18-8da5-3582-0cf3-c3b2636c836a Tue, 15 Jul 2025 00:00:00 +0000 A zero-click exploit called EchoLeak reveals how AI assistants like Microsoft 365 Copilot can be manipulated to leak sensitive data without user interaction. This entry breaks down how the attack works, why it matters, and what defenses are available to proactively mitigate this emerging AI-native threat. Trend Micro Research : Articles, News, Reports Trend Micro Research : Artificial Intelligence (AI) BERT Ransomware Group Targets Asia and Europe on Multiple Platforms https://www.trendmicro.com/en_us/research/25/g/bert-ransomware-group-targets-asia-and-europe-on-multiple-platforms.html Research, News, and Perspective urn:uuid:3811eb37-8cd4-6beb-f70c-a7fa46b14950 Mon, 07 Jul 2025 00:00:00 +0000 BERT is a newly emerged ransomware group that pairs simple code with effective execution—carrying out attacks across Europe and Asia. In this entry, we examine the group’s tactics, how their variants have evolved, and the tools they use to get past defenses and speed up encryption across platforms. Trend Micro Research : Articles, News, Reports Trend Micro Research : Ransomware Don Ovid Ladores AI Dilemma: Emerging Tech as Cyber Risk Escalates https://www.trendmicro.com/en_us/research/25/g/ai-cyber-risks.html Research, News, and Perspective urn:uuid:1f4ebc12-0b5d-9ba8-5712-5d56039d2e20 Thu, 03 Jul 2025 00:00:00 +0000 As AI adoption accelerates, businesses face mounting cyber threats—and urgent choices about secure implementation Trend Micro Research : Cloud Trend Micro Research : Latest News Trend Micro Research : Compliance & Risks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Why Trend Micro Continues to be Named a CNAPP Leader https://www.trendmicro.com/en_us/research/25/f/idc-cnapp-leader-2025.html Research, News, and Perspective urn:uuid:6bd1c32f-54d6-d172-2529-75d1335cce6b Fri, 27 Jun 2025 00:00:00 +0000 Trend Micro is recognized for our Cloud CNAPP capabilities and product strategy—affirming our vision to deliver a cloud security solution that predicts, protects, and responds to threats across hybrid and multi-cloud environments. Trend Micro Research : Cloud Trend Micro Research : Compliance & Risks Trend Micro Research : Endpoints Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Reports Trend Micro Research : Articles, News, Reports Truman Coburn How to Build an Effective Security Awareness Program https://www.trendmicro.com/en_us/research/25/f/security-awareness-program.html Research, News, and Perspective urn:uuid:4284a668-8dd4-b2ec-d86b-fcf375a6795a Fri, 27 Jun 2025 00:00:00 +0000 This is a step-by-step guide to build a strong security awareness and training program that empowers your employees and protects your business. Trend Micro Research : Phishing Trend Micro Research : How To Trend Micro Research : Articles, News, Reports Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI Agent https://www.trendmicro.com/en_us/research/25/f/why-a-classic-mcp-server-vulnerability-can-undermine-your-entire-ai-agent.html Research, News, and Perspective urn:uuid:e7ef8366-a96d-f08b-cebd-a7107062ba74 Tue, 24 Jun 2025 00:00:00 +0000 A single SQL injection bug in Anthropic’s SQLite MCP server—forked over 5,000 times—can seed stored prompts, exfiltrate data, and hand attackers the keys to entire agent workflows. This entry unpacks the attack chain and lays out concrete fixes to shut it down. Trend Micro Research : Articles, News, Reports Trend Micro Research : Artificial Intelligence (AI) Sean Park Critical Langflow Vulnerability (CVE-2025-3248) Actively Exploited to Deliver Flodrix Botnet https://www.trendmicro.com/en_us/research/25/f/langflow-vulnerability-flodric-botnet.html Research, News, and Perspective urn:uuid:331b7cad-2cae-ad95-04e8-c893eedbf70a Tue, 17 Jun 2025 00:00:00 +0000 This blog uncovers an active campaign exploiting CVE-2025-3248 in Langflow versions before 1.3.0 that deploys the Flodrix botnet, enabling threat actors to achieve full system compromise, initiate DDoS attacks, and potentially exfiltrate sensitive data. Trend Micro Research : Articles, News, Reports Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Aliakbar Zahravi Enabling Secure AI Inference: Trend Cybertron Leverages NVIDIA Universal LLM NIM Microservices https://www.trendmicro.com/en_us/research/25/f/cybertron-nvidia-universal-llm-nim-microservices.html Research, News, and Perspective urn:uuid:9a05fb7a-1bb7-22cf-69de-ee50307a2e12 Wed, 11 Jun 2025 00:00:00 +0000 Learn how Trend's Cybertron has been harnessing the power of NVIDIA Universal LLM NIM Microservices. Trend Micro Research : Cloud Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Expert Perspective Trend Micro Research : Articles, News, Reports Patrick Lu Innovation in the Fast Lane: Lessons from Motorsport and Cybersecurity https://www.trendmicro.com/en_us/research/25/f/motorsport-cybersecurity.html Research, News, and Perspective urn:uuid:01d3c28a-ac8f-e6c8-4aa2-130a453920fd Wed, 11 Jun 2025 00:00:00 +0000 Learn how Trend Micro and NEOM McLaren Formula E Team turn creativity into innovation by rethinking team structures, workflows, and data use. Trend Micro Research : Compliance & Risks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Expert Perspective Trend Micro Research : Video Trend Micro Research : Privacy & Risks Marianne Lee Ensuring Secure Container Deployments with Image Signature Verification https://www.trendmicro.com/en_us/research/25/f/secure-containers-verified-image-signature.html Research, News, and Perspective urn:uuid:cc29d7a3-7c16-c174-b7a9-ed1d22669798 Wed, 11 Jun 2025 00:00:00 +0000 Ensure your container deployments are secure with a verified image signature. Trend Micro Research : Cloud Trend Micro Research : Compliance & Risks Trend Micro Research : How To Trend Micro Research : Articles, News, Reports Eduardo Golcman Keeping Pace and Embracing Emerging Technologies https://www.trendmicro.com/en_us/research/25/f/emerging-technologies-motorsport.html Research, News, and Perspective urn:uuid:dceb14d3-ecac-1ba9-9028-19d1f3f54f40 Mon, 09 Jun 2025 00:00:00 +0000 Trend Micro and the NEOM McLaren Formula E Team stay ahead of the curve by embracing new technologies, fostering a no-blame culture, and making split-second decisions in high-stakes environments. Trend Micro Research : Cyber Crime Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Expert Perspective Trend Micro Research : Video Trend Micro Research : Cyber Threats Robert McArdle NEOM McLaren Formula E Team & Trend Micro Innovation History https://www.trendmicro.com/en_us/research/25/f/neom-mclaren-innovation-history.html Research, News, and Perspective urn:uuid:d9b6b425-9b29-d41d-c14d-c4f4ab927b18 Fri, 06 Jun 2025 00:00:00 +0000 Explore how innovation becomes a team sport when Trend Micro and the NEOM McLaren Formula E Team leaders come together to talk culture, risk, and forward thinking. Trend Micro Research : Compliance & Risks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Expert Perspective Trend Micro Research : Video Trend Micro Research : Privacy & Risks Greg Young How Google’s Wiz Acquisition Impacts CNAPP https://www.trendmicro.com/en_us/research/25/f/google-wiz-acquisition-cnapp.html Research, News, and Perspective urn:uuid:eb1a91db-d1ee-68cc-e902-008050acdf68 Fri, 06 Jun 2025 00:00:00 +0000 Google aims to stake out a share of the CNAPP market and compete head-on against AWS and Microsoft Azure with its planned Wiz acquisition. What are the implications for companies invested in AWS and Azure cloud infrastructure? Trend Micro Research : Cloud Trend Micro Research : Articles, News, Reports Trend Micro Research : Expert Perspective Bestin Koruthu Threat Intelligence Sweeping now supports container security telemetry data https://www.trendmicro.com/en_us/research/25/f/vision-one-threat-intelligence-stops-threats.html Research, News, and Perspective urn:uuid:34d378fa-d0a0-05db-4811-8db5cdc3f0ab Fri, 06 Jun 2025 00:00:00 +0000 Threat Intelligence Sweeping starts to support sweep container security telemetry data. Users can now use the TI tool to identify possible malicious activity in their container-based environments. The trigger events are visible in workbench alert. Trend Micro Research : Cloud Trend Micro Research : APT & Targeted Attacks Trend Micro Research : How To Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Fernando Cardoso Driving Success on the Track or in the Boardroom https://www.trendmicro.com/en_us/research/25/f/driving-success-neom-mclaren.html Research, News, and Perspective urn:uuid:cb774f4b-b70f-7701-779c-cdddff6c0e2c Wed, 04 Jun 2025 00:00:00 +0000 Discover how the Trend Micro and the NEOM McLaren Formula E Team partnership is powered by a common vision for winning, on the track and in the boardroom. Trend Micro Research : Compliance & Risks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Expert Perspective Trend Micro Research : Video Trend Micro Research : Privacy & Risks Dhanya Thakkar Earth Lamia Develops Custom Arsenal to Target Multiple Industries https://www.trendmicro.com/en_us/research/25/e/earth-lamia.html Research, News, and Perspective urn:uuid:98e11ca8-ff51-ed95-c0a4-180c32b55239 Tue, 27 May 2025 00:00:00 +0000 Trend™ Research has been tracking an active APT threat actor named Earth Lamia, targeting multiple industries in Brazil, India and Southeast Asia countries at least since 2023. The threat actor primarily exploits vulnerabilities in web applications to gain access to targeted organizations. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Joseph C Chen Trend Micro Leading the Fight to Secure AI https://www.trendmicro.com/en_us/research/25/e/mitre-atlas-secure-ai.html Research, News, and Perspective urn:uuid:6157233b-7c61-2972-9c82-637da8f30585 Tue, 27 May 2025 00:00:00 +0000 New MITRE ATLAS submission helps strengthen organizations’ cyber resilience Trend Micro Research : Cloud Trend Micro Research : Latest News Trend Micro Research : Compliance & Risks Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Alfredo Oliveira Fake CAPTCHA Attacks Deploy Infostealers and RATs in a Multistage Payload Chain https://www.trendmicro.com/en_us/research/25/e/unmasking-fake-captcha-cases.html Research, News, and Perspective urn:uuid:4d9b9773-1e35-688c-1996-09f055009fad Mon, 19 May 2025 00:00:00 +0000 We have detected a new tactic involving fake CAPTCHA pages that trick users into executing harmful commands in Windows. This scheme uses disguised files sent via phishing and other malicious methods. Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Buddy Tancio Using Agentic AI & Digital Twin for Cyber Resilience https://www.trendmicro.com/en_us/research/25/e/ai-digital-twin-cyber-resilience.html Research, News, and Perspective urn:uuid:1af350dd-dc52-6df3-0122-74f9007ff89d Sun, 18 May 2025 00:00:00 +0000 Learn how Trend is combining agentic AI and digital twin to transform the way organizations protect themselves from cyber threats. Trend Micro Research : Latest News Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Trend Secures AI Infrastructure with NVIDIA https://www.trendmicro.com/en_us/research/25/e/trend-secures-ai-infrastructure-with-nvidia.html Research, News, and Perspective urn:uuid:328245e8-1808-019b-c63f-1399f304e148 Sun, 18 May 2025 00:00:00 +0000 Together, we are focused on securing the full AI lifecycle—from development and training to deployment and inference—across cloud, data center, and AI factories. Trend Micro Research : Latest News Trend Micro Research : Articles, News, Reports Trend Micro Research : Artificial Intelligence (AI) Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan https://www.trendmicro.com/en_us/research/25/e/earth-ammit.html Research, News, and Perspective urn:uuid:540bf713-4289-254d-161f-22e9f02a9612 Tue, 13 May 2025 00:00:00 +0000 Trend™ Research discusses the evolving tradecraft of threat actor Earth Ammit, proven by the advanced toolset used in its TIDRONE and VENOM campaigns that targeted the drone supply chain. Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Trend Micro Research : Research Pierre Lee Trend Micro Puts a Spotlight on AI at Pwn2Own Berlin https://www.trendmicro.com/en_us/research/25/e/pwn2own-berlin-2025.html Research, News, and Perspective urn:uuid:7be4b064-6a93-f95d-9bdc-bd8c7905bc72 Tue, 13 May 2025 00:00:00 +0000 Get a sneak peak into how Trend Micro's Pwn2Own Berlin 2025 is breaking new ground, focusing on AI infrastructure and finding the bugs to proactively safeguard the future of computing. Trend Micro Research : Latest News Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Russ Meyers Maritime Cybersecurity: Threats & Regulations Loom https://www.trendmicro.com/en_us/research/25/e/maritime-cybersecurity-threats-regulations.html Research, News, and Perspective urn:uuid:6c643e13-9004-7c7e-23f4-aeb1c160bef8 Fri, 09 May 2025 00:00:00 +0000 This review summarizes the key insights shared during the webinar held on April 9th, which featured maritime cybersecurity experts discussing the growing challenges facing ports, logistics operations, and global supply chains. Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Trend Micro Research : Expert Perspective Zack Martin Agenda Ransomware Group Adds SmokeLoader and NETXLOADER to Their Arsenal https://www.trendmicro.com/en_us/research/25/e/agenda-ransomware-group-adds-smokeloader-and-netxloader-to-their.html Research, News, and Perspective urn:uuid:134b88d5-e91a-f6bb-59a5-01de41cc8e61 Wed, 07 May 2025 00:00:00 +0000 During our monitoring of Agenda ransomware activities, we uncovered campaigns that made use of the SmokeLoader malware and a new loader we've named NETXLOADER. Trend Micro Research : Endpoints Trend Micro Research : Ransomware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Jacob Santos Exploring PLeak: An Algorithmic Method for System Prompt Leakage https://www.trendmicro.com/en_us/research/25/e/exploring-pleak.html Research, News, and Perspective urn:uuid:6602fa58-c686-e8ff-9431-7291330da176 Thu, 01 May 2025 00:00:00 +0000 What is PLeak, and what are the risks associated with it? We explored this algorithmic technique and how it can be used to jailbreak LLMs, which could be leveraged by threat actors to manipulate systems and steal sensitive data. Trend Micro Research : Research Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Karanjot Singh Saggu Earth Kasha Updates TTPs in Latest Campaign Targeting Taiwan and Japan https://www.trendmicro.com/en_us/research/25/d/earth-kasha-updates-ttps.html Research, News, and Perspective urn:uuid:d0e9f9af-0b4a-d72d-d032-981713a7722e Wed, 30 Apr 2025 00:00:00 +0000 This blog discusses the latest modifications observed in Earth Kasha’s TTPs from their latest campaign detected in March 2025 targeting Taiwan and Japan. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Articles, News, Reports Trend Micro Research : Research Hara Hiroaki NVIDIA Riva Vulnerabilities Leave AI-Powered Speech and Translation Services at Risk https://www.trendmicro.com/en_us/research/25/d/nvidia-riva-vulnerabilities.html Research, News, and Perspective urn:uuid:666e4551-79dd-25fb-dbe9-8aadbf8e514e Mon, 28 Apr 2025 00:00:00 +0000 Trend Research uncovered misconfigurations in NVIDIA Riva deployments, with two vulnerabilities, CVE-2025-23242 and CVE-2025-23243, contributing to their exposure. These security flaws could lead to unauthorized access, resource abuse, and potential misuse or theft of AI-powered inference services, including speech recognition and text-to-speech processing. Trend Micro Research : Endpoints Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Alfredo Oliveira Earth Kurma APT Campaign Targets Southeast Asian Government, Telecom Sectors https://www.trendmicro.com/en_us/research/25/d/earth-kurma-apt-campaign.html Research, News, and Perspective urn:uuid:8000ed26-5043-c739-aacb-37c741eeca5c Fri, 25 Apr 2025 00:00:00 +0000 An APT group dubbed Earth Kurma is actively targeting government and telecommunications organizations in Southeast Asia using advanced malware, rootkits, and trusted cloud services to conduct cyberespionage. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Nick Dai Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations https://www.trendmicro.com/en_us/research/25/d/russian-infrastructure-north-korean-cybercrime.html Research, News, and Perspective urn:uuid:fdd87b90-c7ab-3567-1b67-e87e04424c03 Wed, 23 Apr 2025 00:00:00 +0000 In this blog entry, we discuss how North Korea's significant role in cybercrime – including campaigns attributed to Void Dokkaebi – is facilitated by extensive use of anonymization networks and the use of Russian IP ranges. Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Trend Micro Research : Research Feike Hacquebord FOG Ransomware Spread by Cybercriminals Claiming Ties to DOGE https://www.trendmicro.com/en_us/research/25/d/fog-ransomware-concealed-within-binary-loaders-linking-themselve.html Research, News, and Perspective urn:uuid:6a1f8c52-507f-6692-6e46-0869e5fc34e6 Mon, 21 Apr 2025 00:00:00 +0000 This blog details our investigation of malware samples that conceal within them a FOG ransomware payload. Trend Micro Research : Articles, News, Reports Trend Micro Research : Ransomware Trend Micro Research : Research Nathaniel Morales CrazyHunter Campaign Targets Taiwanese Critical Sectors https://www.trendmicro.com/en_us/research/25/d/crazyhunter-campaign.html Research, News, and Perspective urn:uuid:beb8f883-032a-c07c-3a2f-00cf8a5c155f Wed, 16 Apr 2025 00:00:00 +0000 This blog entry details research on emerging ransomware group CrazyHunter, which has launched a sophisticated campaign aimed at Taiwan's essential services. Trend Micro Research : Endpoints Trend Micro Research : Ransomware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Maristel Policarpio ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains https://www.trendmicro.com/en_us/research/25/d/zdi-23-1527-and-zdi-23-1528-the-potential-impact-of-overly-permi.html Research, News, and Perspective urn:uuid:b9fcbbdb-39d3-9cad-5e2a-b27c04786f95 Tue, 15 Apr 2025 00:00:00 +0000 In ZDI-23-1527 and ZDI-23-1528 we uncover two possible scenarios where attackers could have compromised the Microsoft PC Manager supply chain. Trend Micro Research : Cyber Risk Trend Micro Research : Articles, News, Reports Trend Micro Research : Research Nitesh Surana Strengthen Security with Cyber Risk Advisory https://www.trendmicro.com/en_us/research/25/d/cyber-risk-advisory.html Research, News, and Perspective urn:uuid:690d8095-8768-1c08-ee5c-3f4b35649b5b Tue, 15 Apr 2025 00:00:00 +0000 In today’s fast-paced digital world, cyber threats are constantly evolving. Attackers are leveraging advanced techniques and artificial intelligence (AI) to exploit vulnerabilities, leaving organizations vulnerable to breaches and disruptions. To combat these challenges, organizations must stay vigilant and implement more proactive cybersecurity measures. This is where our Cyber Risk Advisory service, powered by the Trend Vision One™ Cyber Risk Exposure Management (CREM) solution, step in to provide a strategic edge. Trend Micro Research : Cloud Trend Micro Research : Latest News Trend Micro Research : Endpoints Trend Micro Research : Network Trend Micro Research : Articles, News, Reports Trend Micro Research : Data center Kim Kinahan Top 10 for LLM & Gen AI Project Ranked by OWASP https://www.trendmicro.com/en_us/research/25/d/top-llm-gen-ai.html Research, News, and Perspective urn:uuid:94875dc5-8bf7-814c-44bb-6c3a40d98fdd Tue, 15 Apr 2025 00:00:00 +0000 Trend Micro has become a Gold sponsor of the OWASP Top 10 for LLM and Gen AI Project, merging cybersecurity expertise with OWASP's collaborative efforts to address emerging AI security risks. This partnership underscores Trend Micro's unwavering commitment to advancing AI security, ensuring a secure foundation for the transformative power of AI. Trend Micro Research : Latest News Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Kim Kinahan BPFDoor’s Hidden Controller Used Against Asia, Middle East Targets https://www.trendmicro.com/en_us/research/25/d/bpfdoor-hidden-controller.html Research, News, and Perspective urn:uuid:93d61ced-9166-ec9a-329c-5cff00970092 Mon, 14 Apr 2025 00:00:00 +0000 A controller linked to BPF backdoor can open a reverse shell, enabling deeper infiltration into compromised networks. Recent attacks have been observed targeting the telecommunications, finance, and retail sectors across South Korea, Hong Kong, Myanmar, Malaysia, and Egypt. Trend Micro Research : Malware Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Fernando Mercês Incomplete NVIDIA Patch to CVE-2024-0132 Exposes AI Infrastructure and Data to Critical Risks https://www.trendmicro.com/en_us/research/25/d/incomplete-nvidia-patch.html Research, News, and Perspective urn:uuid:a76fd5d5-9025-f2c7-c9bf-547c323d23bf Thu, 10 Apr 2025 00:00:00 +0000 A previously disclosed vulnerability in NVIDIA Container Toolkit has an incomplete patch, which, if exploited, could put a wide range of AI infrastructure and sensitive data at risk. Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Trend Micro Research : Network Trend Micro Research : Articles, News, Reports Abdelrahman Esmail Trend Vision One™ Now Supports Azure vTAP https://www.trendmicro.com/en_us/research/25/d/ndr-supports-azure-vtap.html Research, News, and Perspective urn:uuid:79b497ab-1a5b-55f2-1cb4-56fefb6834dc Wed, 09 Apr 2025 00:00:00 +0000 Effective April 2025, Microsoft is launching their Azure vTAP and integrating it with Trend Vision One Network Detection and Response solution. This integration allows organizations to gain deep visibility into cloud network traffic without compromising performance. It ensures real-time detection, faster incident response, and an enhanced security posture while reducing operational complexity. Trend Micro Research : Cloud Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Compliance & Risks Trend Micro Research : Endpoints Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Network Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports Janet Yao CTEM + CREM: Aligning Your Cybersecurity Strategy https://www.trendmicro.com/en_us/research/25/d/ctem-crem-cybersecurity-strategy.html Research, News, and Perspective urn:uuid:adbff737-8dd5-6efd-e87d-e4e8382fc276 Tue, 08 Apr 2025 00:00:00 +0000 Cyber threats evolve daily, and organizations need to move beyond traditional security approaches to stay ahead. That’s why Continuous Threat Exposure Management (CTEM), a concept introduced by Gartner, has been gaining traction. CTEM isn’t just another cybersecurity buzzword; it’s a structured, continuous program designed to help organizations identify, assess, and mitigate security risks proactively. If you’re considering implementing a CTEM program, Trend Vision One TM Cyber Risk Exposure Management (CREM) solution—formerly known as Attack Surface Risk Management (ASRM)—can give you a significant head start. Trend Micro Research : Cloud Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Expert Perspective Trend Micro Research : Cyber Threats Trend Micro Research : Compliance & Risks Trend Micro Research : Endpoints Trend Micro Research : Network Trend Micro Research : Articles, News, Reports Alifiya Sadikali GTC 2025: AI, Security & The New Blueprint https://www.trendmicro.com/en_us/research/25/d/gtc-ai-security-2025.html Research, News, and Perspective urn:uuid:0ef3c097-210f-de8d-e175-9e3144a539c8 Mon, 07 Apr 2025 00:00:00 +0000 From quantum leaps to AI factories, GTC 2025 proved one thing: the future runs on secure foundations. Trend Micro Research : Cloud Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Expert Perspective Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Shannon Murphy Capacity is Critical in Riskier Threat Landscape https://www.trendmicro.com/en_us/research/25/d/threat-landscape-capacity.html Research, News, and Perspective urn:uuid:8508da8d-687e-5dce-b6b7-88b4a8bbae82 Fri, 04 Apr 2025 00:00:00 +0000 International cooperation, reporting, and capacity building are critical to enhance cybersecurity defenses. Effective governance in an increasingly risky landscape requires visibility as well as coordinated vulnerability disclosure. Trend Micro Research : Cloud Trend Micro Research : Compliance & Risks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Expert Perspective Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats AI Team