US - Research, News, and Perspectives http://feed.informer.com/digests/G5HRN3DTV4/feeder US - Research, News, and Perspectives Respective post owners and feed distributors Tue, 09 Nov 2021 16:45:03 +0000 Feed Informer http://feed.informer.com/ RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits https://www.trendmicro.com/en_us/research/25/j/rondodox.html Research, News, and Perspective urn:uuid:11e41e25-0dcd-49c9-b5e4-02a1b4ccbd36 Thu, 09 Oct 2025 00:00:00 +0000 Trend™ Research and ZDI Threat Hunters have identified a large-scale RondoDox botnet campaign exploiting over 50 vulnerabilities across more than 30 vendors, including flaws first seen in Pwn2Own contests. Trend Micro Research : Latest News Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Deep Patel Weaponized AI Assistants & Credential Thieves https://www.trendmicro.com/en_us/research/25/j/weaponized-ai-assistants.html Research, News, and Perspective urn:uuid:898d26cb-1f32-9b71-e753-93399c26c4fa Thu, 09 Oct 2025 00:00:00 +0000 Learn the state of AI and the NPM ecosystem with the recent s1ngularity' weaponized AI for credential theft. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Articles, News, Reports Trend Micro Research : Research Fernando Tucci How Your AI Chatbot Can Become a Backdoor https://www.trendmicro.com/en_us/research/25/j/ai-chatbot-backdoor.html Research, News, and Perspective urn:uuid:97454f67-8171-b22c-1988-f62cc7305278 Wed, 08 Oct 2025 00:00:00 +0000 In this post of THE AI BREACH, learn how your Chatbot can become a backdoor. Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Kim Kinahan A Cascade of Insecure Architectures: Axis Plugin Design Flaw Expose Select Autodesk Revit Users to Supply Chain Risk https://www.trendmicro.com/en_us/research/25/j/axis-plugin-flaw-autodesk-revit-supply-chain-risk.html Research, News, and Perspective urn:uuid:a98a4d60-69fa-35c3-8716-3039416f0ec5 Wed, 08 Oct 2025 00:00:00 +0000 We discovered Azure Storage Account credentials exposed in Axis Communications’ Autodesk Revit plugin, allowing unauthorized modification of cloud-hosted files. This exposure, combined with vulnerabilities in Autodesk Revit, could enable supply-chain attacks targeting end users. Trend Micro Research : Cloud Trend Micro Research : Articles, News, Reports Trend Micro Research : Exploits & Vulnerabilities Nitesh Surana Self-Propagating Malware Spreading Via WhatsApp, Targets Brazilian Users https://www.trendmicro.com/en_us/research/25/j/self-propagating-malware-spreads-via-whatsapp.html Research, News, and Perspective urn:uuid:3baf09c7-2e15-041c-9607-fcfdf4d68ada Fri, 03 Oct 2025 00:00:00 +0000 Trend™ Research has identified an active campaign spreading via WhatsApp through a ZIP file attachment. When executed, the malware establishes persistence and hijacks the compromised WhatsApp account to send copies of itself to the victim’s contacts. Trend Micro Research : Latest News Trend Micro Research : Malware Trend Micro Research : Research Trend Micro Research : Phishing Jeffrey Francis Bonaobra CNAPP is the Solution to Multi-cloud Flexibility https://www.trendmicro.com/en_us/research/25/i/cnapp-multi-cloud.html Research, News, and Perspective urn:uuid:d0d057a0-9efc-f4ce-0186-dfed4576ffbf Fri, 26 Sep 2025 00:00:00 +0000 Cloud-native application protection platform (CNAPP) not only helps organizations protect, but offers the flexibility of multi-cloud. Trend Micro Research : Cloud Trend Micro Research : Consumer Focus Trend Micro Research : Articles, News, Reports Bestin Koruthu Cloud Security in the CNAPP Era: Eight Important Takeaways https://www.trendmicro.com/en_us/research/25/i/cloud-security-cnapp.html Research, News, and Perspective urn:uuid:52d269a6-d97e-7ac3-789f-3337c203527e Fri, 26 Sep 2025 00:00:00 +0000 Eight takeaways on why Trend Vision One™ embodies the best of today’s CNAPP vision. Includes insights from 2025 Gartner® Market Guide for CNAPP Trend Micro Research : Cloud Trend Micro Research : Compliance & Risks Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Bestin Koruthu New LockBit 5.0 Targets Windows, Linux, ESXi https://www.trendmicro.com/en_us/research/25/i/lockbit-5-targets-windows-linux-esxi.html Research, News, and Perspective urn:uuid:61226819-ad50-e11b-f9e0-f22b74cc97e2 Thu, 25 Sep 2025 00:00:00 +0000 Trend™ Research analyzed source binaries from the latest activity from notorious LockBit ransomware with their 5.0 version that exhibits advanced obfuscation, anti-analysis techniques, and seamless cross-platform capabilities for Windows, Linux, and ESXi systems. Trend Micro Research : Latest News Trend Micro Research : Ransomware Trend Micro Research : Research Sarah Pearl Camiling This Is How Your LLM Gets Compromised https://www.trendmicro.com/en_us/research/25/i/prevent-llm-compromise.html Research, News, and Perspective urn:uuid:3f728b04-2d9e-c92f-b977-9d4712174c35 Wed, 24 Sep 2025 00:00:00 +0000 Poisoned data. Malicious LoRAs. Trojan model files. AI attacks are stealthier than ever—often invisible until it’s too late. Here’s how to catch them before they catch you. Trend Micro Research : Research Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Fernando Tucci Domino Effect: How One Vendor's AI App Breach Toppled Giants https://www.trendmicro.com/en_us/research/25/i/ai-app-breach.html Research, News, and Perspective urn:uuid:daadf400-5e1a-16f6-a97d-238fe90a9efb Wed, 24 Sep 2025 00:00:00 +0000 A single AI chatbot breach at Salesloft-Drift exposed data from 700+ companies, including security leaders. The attack shows how AI integrations expand risk, and why controls like IP allow-listing, token security, and monitoring are critical. Trend Micro Research : Articles, News, Reports Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Research Fernando Tucci AI-Powered App Exposes User Data, Creates Risk of Supply Chain Attacks https://www.trendmicro.com/en_us/research/25/i/ai-powered-app-exposes-user-data.html Research, News, and Perspective urn:uuid:0f5c59f3-2318-ce6e-b534-438d173b2cbc Tue, 23 Sep 2025 00:00:00 +0000 Trend™ Research’s analysis of Wondershare RepairIt reveals how the AI-driven app exposed sensitive user data due to unsecure cloud storage practices and hardcoded credentials, creating risks of model tampering and supply chain attacks. Trend Micro Research : Articles, News, Reports Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Research Alfredo Oliveira How AI-Native Development Platforms Enable Fake Captcha Pages https://www.trendmicro.com/en_us/research/25/i/ai-development-platforms-enable-fake-captcha-pages.html Research, News, and Perspective urn:uuid:ccbbcd3a-4ce4-f40a-c343-854fc0db178e Fri, 19 Sep 2025 00:00:00 +0000 Cybercriminals are abusing AI-native platforms like Vercel, Netlify, and Lovable to host fake captcha pages that deceive users, bypass detection, and drive phishing campaigns. Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Web Trend Micro Research : Research Trend Micro Research : Phishing Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Ryan Flores What We Know About the NPM Supply Chain Attack https://www.trendmicro.com/en_us/research/25/i/npm-supply-chain-attack.html Research, News, and Perspective urn:uuid:e5966f02-025b-05ca-9a43-07d364f2239a Thu, 18 Sep 2025 00:00:00 +0000 Trend™ Research outlines the critical details behind the ongoing NPM supply chain attack and offers essential steps to stay protected against potential compromise. Trend Micro Research : Latest News Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Jeffrey Francis Bonaobra EvilAI Operators Use AI-Generated Code and Fake Apps for Far-Reaching Attacks https://www.trendmicro.com/en_us/research/25/i/evilai.html Research, News, and Perspective urn:uuid:4e5df924-0b88-e22c-eb63-e51319d7bcfb Thu, 11 Sep 2025 00:00:00 +0000 Combining AI-generated code and social engineering, EvilAI operators are executing a rapidly expanding campaign, disguising their malware as legitimate applications to bypass security, steal credentials, and persistently compromise organizations worldwide. Trend Micro Research : Malware Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Research Jeffrey Francis Bonaobra What’s Your Cybersecurity Maturity? https://www.trendmicro.com/en_us/research/25/i/cybersecurity-maturity.html Research, News, and Perspective urn:uuid:616e1510-69db-3ab3-6a9e-b6703df12f3e Wed, 10 Sep 2025 00:00:00 +0000 This blog post looks at four key milestones along the cybersecurity maturity journey and poses some questions you can ask to determine the stage of your organization’s progress. Trend Micro Research : Cloud Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Cyber Threats Trend Micro Research : Data center Trend Micro Research : Network Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports Unmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed https://www.trendmicro.com/en_us/research/25/i/unmasking-the-gentlemen-ransomware.html Research, News, and Perspective urn:uuid:9e2225ce-d9d3-2c78-7d29-af2c785cfbda Tue, 09 Sep 2025 00:00:00 +0000 An analysis of the Gentlemen ransomware group, which employs advanced, adaptive tactics, techniques, and procedure to target critical industries worldwide. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Ransomware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Jacob Santos Three Critical Facts About Cyber Risk Management https://www.trendmicro.com/en_us/research/25/i/cyber-risk-management-facts.html Research, News, and Perspective urn:uuid:19902f70-ec1d-d50e-3f2a-4bd0ef37b3b1 Thu, 04 Sep 2025 00:00:00 +0000 For CISOs responsible for cyber risk management, these three insights will help build a strong and reliable foundation for your proactive security strategy. Trend Micro Research : Cloud Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Cyber Threats Trend Micro Research : Data center Trend Micro Research : Endpoints Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via ‘Cracked’ Apps https://www.trendmicro.com/en_us/research/25/i/an-mdr-analysis-of-the-amos-stealer-campaign.html Research, News, and Perspective urn:uuid:f063bae4-a9d1-98bd-ef59-cf63692efa17 Thu, 04 Sep 2025 00:00:00 +0000 Trend™ Research analyzed a campaign distributing Atomic macOS Stealer (AMOS), a malware family targeting macOS users. Attackers disguise the malware as “cracked” versions of legitimate apps, luring users into installation. Trend Micro Research : Malware Trend Micro Research : Endpoints Trend Micro Research : Investigations Trend Micro Research : Research Trend Micro Research : Expert Perspective Trend Micro Research : Articles, News, Reports Buddy Tancio Operation Serengeti 2.0: Trend Micro Helps Law Enforcement Fight Cybercrime in Africa https://www.trendmicro.com/en_us/research/25/h/operation-serengeti-trend-micro.html Research, News, and Perspective urn:uuid:862edd4a-fa33-1246-f10b-49bf0ce12403 Fri, 29 Aug 2025 00:00:00 +0000 Operation Serengeti 2.0: With Trend Micro’s support, INTERPOL led a major crackdown across Africa, arresting cybercriminals, dismantling infrastructures, recovering illicit funds, and protecting tens of thousands of victims. Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Crime Trend Micro Research TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents https://www.trendmicro.com/en_us/research/25/h/taoth-campaign.html Research, News, and Perspective urn:uuid:6cdb0e8f-b2eb-583e-af79-70243fa39d78 Thu, 28 Aug 2025 00:00:00 +0000 The TAOTH campaign exploited abandoned software and spear-phishing to deploy multiple malware families, targeting dissidents and other high-value individuals across Eastern Asia. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Nick Dai Trend Vision One™ Email Security Raises the Standard https://www.trendmicro.com/en_us/research/25/h/email-security-standards.html Research, News, and Perspective urn:uuid:a9220eca-4a21-6de5-21ea-b9a624e9bbb2 Thu, 28 Aug 2025 00:00:00 +0000 Learn all the new aspects of Trend Vision One™ Email Security and how it's raising the standard of effectiveness for the industry. Trend Micro Research : Malware Trend Micro Research : Expert Perspective Trend Micro Research : Phishing Trend Micro Research : Cyber Threats Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Ransomware Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Spam Trend Micro Research : Articles, News, Reports Sara Atie Trend Vision One Integrates Microsoft Defender for Endpoint https://www.trendmicro.com/en_us/research/25/h/vision-one-integrates-microsoft-defender.html Research, News, and Perspective urn:uuid:176dfcb7-5a96-c23f-d9dd-8cdc80ec83b8 Tue, 26 Aug 2025 00:00:00 +0000 Discover how Trend Vision One integrates with Microsoft Defender for Endpoint to unify visibility, close security gaps, and accelerate risk mitigation - maximizing protection without replacing existing tools. Trend Micro Research : Cloud Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Cyber Threats Trend Micro Research : Compliance & Risks Trend Micro Research : Endpoints Trend Micro Research : Network Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports Jenny Hua Leadership, Innovation, and the Future of AI: Lessons from Trend Micro CEO & Co-Founder Eva Chen https://www.trendmicro.com/en_us/research/25/h/eva-chen-future-of-ai.html Research, News, and Perspective urn:uuid:69512dc3-1504-89b3-bc4e-3f1b8976d44e Fri, 22 Aug 2025 00:00:00 +0000 Discover how AI is reshaping cybersecurity through our CEO, Eva Chen’s industry briefing series. Gain practical strategies, real-world insights, and a clear roadmap to secure your AI initiatives with confidence. Trend Micro Research : Articles, News, Reports Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Expert Perspective Ashley Savoie Warlock: From SharePoint Vulnerability Exploit to Enterprise Ransomware https://www.trendmicro.com/en_us/research/25/h/warlock-ransomware.html Research, News, and Perspective urn:uuid:ce14d149-3ca7-691f-3191-b5cb1ac51f36 Wed, 20 Aug 2025 00:00:00 +0000 Warlock ransomware exploits unpatched Microsoft SharePoint vulnerabilities to gain access, escalate privileges, steal credentials, move laterally, and deploy ransomware with data exfiltration across enterprise environments. Trend Micro Research : Endpoints Trend Micro Research : Ransomware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Jeffrey Francis Bonaobra Crypto24 Ransomware Group Blends Legitimate Tools with Custom Malware for Stealth Attacks https://www.trendmicro.com/en_us/research/25/h/crypto24-ransomware-stealth-attacks.html Research, News, and Perspective urn:uuid:2507d8e9-e309-1c36-c03e-e0dbd2b05675 Thu, 14 Aug 2025 00:00:00 +0000 Crypto24 is a ransomware group that stealthily blends legitimate tools with custom malware, using advanced evasion techniques to bypass security and EDR technologies. Trend Micro Research : Ransomware Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Maristel Policarpio New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises https://www.trendmicro.com/en_us/research/25/h/new-ransomware-charon.html Research, News, and Perspective urn:uuid:f35223df-ffe3-4520-d2e5-70252997d48f Tue, 12 Aug 2025 00:00:00 +0000 We uncovered Charon, a new ransomware strainfamily that uses advanced APT-style techniques, including DLL sideloading, process injection, and anti-EDR capabilities, to target organizations with customized ransom demands. Trend Micro Research : Endpoints Trend Micro Research : Ransomware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Jacob Santos Gunra Ransomware Group Unveils Efficient Linux Variant https://www.trendmicro.com/en_us/research/25/g/gunra-ransomware-linux-variant.html Research, News, and Perspective urn:uuid:0ea9fc9b-3a67-f5d6-6b69-c40330bc34f5 Tue, 29 Jul 2025 00:00:00 +0000 This blog discusses how Gunra ransomware’s new Linux variant accelerates and customizes encryption, expanding the group’s reach with advanced cross-platform tactics. Trend Micro Research : Latest News Trend Micro Research : Ransomware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Jeffrey Francis Bonaobra Revisiting UNC3886 Tactics to Defend Against Present Risk https://www.trendmicro.com/en_us/research/25/g/revisiting-unc3886-tactics-to-defend-against-present-risk.html Research, News, and Perspective urn:uuid:76709681-f25c-5167-b621-326c03dcbcf2 Mon, 28 Jul 2025 00:00:00 +0000 We examine the past tactics used by UNC3886 to gain insight on how to best strengthen defenses against the ongoing and emerging threats of this APT group. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Articles, News, Reports Cj Arsley Mateo Unlocking the Power of Amazon Security Lake for Proactive Security https://www.trendmicro.com/en_us/research/25/g/amazon-security-lake-proactive-security.html Research, News, and Perspective urn:uuid:b6aab75a-7bad-2d89-b137-a89fa325db6b Mon, 28 Jul 2025 00:00:00 +0000 Security is a central challenge in modern application development and maintenance, requiring not just traditional practices but also a deep understanding of application architecture and data flow. While organizations now have access to rich data like logs and telemetry, the real challenge lies in translating this information into actionable insights. This article explores how leveraging those insights can help detect genuine security incidents and prevent their recurrence. Trend Micro Research : Cloud Trend Micro Research : Malware Trend Micro Research : How To Trend Micro Research : Phishing Trend Micro Research : Compliance & Risks Trend Micro Research : Ransomware Trend Micro Research : Cyber Risk Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Deep Web Trend Micro Research : Privacy & Risks Trend Micro Research : Cyber Threats Trend Micro Research : Risk Management Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Spam Felipe Costa Proactive Email Security: The Power of AI https://www.trendmicro.com/en_us/research/25/g/proactive-email-security.html Research, News, and Perspective urn:uuid:be0305bf-727b-99c9-bed1-4b2abfc15be9 Thu, 24 Jul 2025 00:00:00 +0000 Lead with AI-powered email security to stay ahead of attackers and personalize user interaction at every touchpoint, bridging technology and behavior with precision. Trend Micro Research : Articles, News, Reports Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Research Sara Atie Back to Business: Lumma Stealer Returns with Stealthier Methods https://www.trendmicro.com/en_us/research/25/g/lumma-stealer-returns.html Research, News, and Perspective urn:uuid:7d90d154-518a-768f-cb8e-566e1190db7d Tue, 22 Jul 2025 00:00:00 +0000 Lumma Stealer has re-emerged shortly after its takedown. This time, the cybergroup behind this malware appears to be intent on employing more covert tactics while steadily expanding its reach. This article shares the latest methods used to propagate this threat. Trend Micro Research : Endpoints Trend Micro Research : Malware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Junestherry Dela Cruz Proactive Security Insights for SharePoint Attacks (CVE-2025-53770 and CVE-2025-53771) https://www.trendmicro.com/en_us/research/25/g/cve-2025-53770-and-cve-2025-53771-sharepoint-attacks.html Research, News, and Perspective urn:uuid:860356d9-46e3-7abf-f046-c82ddb05f0ab Tue, 22 Jul 2025 00:00:00 +0000 CVE-2025-53770 and CVE-2025-53771 are vulnerabilities in on-premise Microsoft SharePoint Servers that evolved from previously patched flaws, allowing unauthenticated remote code execution through advanced deserialization and ViewState abuse. Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Trend Micro Research Securing Tomorrow: An Interview with Trend Micro VP of Product Management Michael Habibi https://www.trendmicro.com/en_us/research/25/g/endpoint-protection-epp-gartner-magic-quadrant-july-2025.html Research, News, and Perspective urn:uuid:9809ee2b-6ddd-9c6b-f2e4-d87a02cb4797 Thu, 17 Jul 2025 00:00:00 +0000 Proactive security in a rapidly evolving threat landscape Trend Micro Research : Endpoints Trend Micro Research : Articles, News, Reports Trend Micro Research : Reports CISA's NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security https://www.trendmicro.com/en_us/research/25/g/nimbus-2000-initiative-findings.html Research, News, and Perspective urn:uuid:28e1d626-bfbf-777c-41cc-688fdf3081c0 Wed, 16 Jul 2025 00:00:00 +0000 This blog explores key findings from CISA’s NIMBUS 2000 Cloud Identity Security Technical Exchange and how Trend Vision One™ Cloud Security aligns with these priorities. It highlights critical challenges in token validation, secrets management, and logging visibility—offering insights into how integrated security solutions can help organizations strengthen their cloud identity defenses and meet evolving federal standards. Trend Micro Research : Cloud Trend Micro Research : Articles, News, Reports Trend Micro Research : Expert Perspective Fernando Cardoso Preventing Zero-Click AI Threats: Insights from EchoLeak https://www.trendmicro.com/en_us/research/25/g/preventing-zero-click-ai-threats-insights-from-echoleak.html Research, News, and Perspective urn:uuid:0008ea18-8da5-3582-0cf3-c3b2636c836a Tue, 15 Jul 2025 00:00:00 +0000 A zero-click exploit called EchoLeak reveals how AI assistants like Microsoft 365 Copilot can be manipulated to leak sensitive data without user interaction. This entry breaks down how the attack works, why it matters, and what defenses are available to proactively mitigate this emerging AI-native threat. Trend Micro Research : Articles, News, Reports Trend Micro Research : Artificial Intelligence (AI) BERT Ransomware Group Targets Asia and Europe on Multiple Platforms https://www.trendmicro.com/en_us/research/25/g/bert-ransomware-group-targets-asia-and-europe-on-multiple-platforms.html Research, News, and Perspective urn:uuid:3811eb37-8cd4-6beb-f70c-a7fa46b14950 Mon, 07 Jul 2025 00:00:00 +0000 BERT is a newly emerged ransomware group that pairs simple code with effective execution—carrying out attacks across Europe and Asia. In this entry, we examine the group’s tactics, how their variants have evolved, and the tools they use to get past defenses and speed up encryption across platforms. Trend Micro Research : Articles, News, Reports Trend Micro Research : Ransomware Don Ovid Ladores AI Dilemma: Emerging Tech as Cyber Risk Escalates https://www.trendmicro.com/en_us/research/25/g/ai-cyber-risks.html Research, News, and Perspective urn:uuid:1f4ebc12-0b5d-9ba8-5712-5d56039d2e20 Thu, 03 Jul 2025 00:00:00 +0000 As AI adoption accelerates, businesses face mounting cyber threats—and urgent choices about secure implementation Trend Micro Research : Cloud Trend Micro Research : Latest News Trend Micro Research : Compliance & Risks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Why Trend Micro Continues to be Named a CNAPP Leader https://www.trendmicro.com/en_us/research/25/f/idc-cnapp-leader-2025.html Research, News, and Perspective urn:uuid:6bd1c32f-54d6-d172-2529-75d1335cce6b Fri, 27 Jun 2025 00:00:00 +0000 Trend Micro is recognized for our Cloud CNAPP capabilities and product strategy—affirming our vision to deliver a cloud security solution that predicts, protects, and responds to threats across hybrid and multi-cloud environments. Trend Micro Research : Cloud Trend Micro Research : Compliance & Risks Trend Micro Research : Endpoints Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Reports Trend Micro Research : Articles, News, Reports Truman Coburn How to Build an Effective Security Awareness Program https://www.trendmicro.com/en_us/research/25/f/security-awareness-program.html Research, News, and Perspective urn:uuid:4284a668-8dd4-b2ec-d86b-fcf375a6795a Fri, 27 Jun 2025 00:00:00 +0000 This is a step-by-step guide to build a strong security awareness and training program that empowers your employees and protects your business. Trend Micro Research : Phishing Trend Micro Research : How To Trend Micro Research : Articles, News, Reports Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI Agent https://www.trendmicro.com/en_us/research/25/f/why-a-classic-mcp-server-vulnerability-can-undermine-your-entire-ai-agent.html Research, News, and Perspective urn:uuid:e7ef8366-a96d-f08b-cebd-a7107062ba74 Tue, 24 Jun 2025 00:00:00 +0000 A single SQL injection bug in Anthropic’s SQLite MCP server—forked over 5,000 times—can seed stored prompts, exfiltrate data, and hand attackers the keys to entire agent workflows. This entry unpacks the attack chain and lays out concrete fixes to shut it down. Trend Micro Research : Articles, News, Reports Trend Micro Research : Artificial Intelligence (AI) Sean Park Critical Langflow Vulnerability (CVE-2025-3248) Actively Exploited to Deliver Flodrix Botnet https://www.trendmicro.com/en_us/research/25/f/langflow-vulnerability-flodric-botnet.html Research, News, and Perspective urn:uuid:331b7cad-2cae-ad95-04e8-c893eedbf70a Tue, 17 Jun 2025 00:00:00 +0000 This blog uncovers an active campaign exploiting CVE-2025-3248 in Langflow versions before 1.3.0 that deploys the Flodrix botnet, enabling threat actors to achieve full system compromise, initiate DDoS attacks, and potentially exfiltrate sensitive data. Trend Micro Research : Articles, News, Reports Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Aliakbar Zahravi Enabling Secure AI Inference: Trend Cybertron Leverages NVIDIA Universal LLM NIM Microservices https://www.trendmicro.com/en_us/research/25/f/cybertron-nvidia-universal-llm-nim-microservices.html Research, News, and Perspective urn:uuid:9a05fb7a-1bb7-22cf-69de-ee50307a2e12 Wed, 11 Jun 2025 00:00:00 +0000 Learn how Trend's Cybertron has been harnessing the power of NVIDIA Universal LLM NIM Microservices. Trend Micro Research : Cloud Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Expert Perspective Trend Micro Research : Articles, News, Reports Patrick Lu Innovation in the Fast Lane: Lessons from Motorsport and Cybersecurity https://www.trendmicro.com/en_us/research/25/f/motorsport-cybersecurity.html Research, News, and Perspective urn:uuid:01d3c28a-ac8f-e6c8-4aa2-130a453920fd Wed, 11 Jun 2025 00:00:00 +0000 Learn how Trend Micro and NEOM McLaren Formula E Team turn creativity into innovation by rethinking team structures, workflows, and data use. Trend Micro Research : Compliance & Risks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Expert Perspective Trend Micro Research : Video Trend Micro Research : Privacy & Risks Marianne Lee Ensuring Secure Container Deployments with Image Signature Verification https://www.trendmicro.com/en_us/research/25/f/secure-containers-verified-image-signature.html Research, News, and Perspective urn:uuid:cc29d7a3-7c16-c174-b7a9-ed1d22669798 Wed, 11 Jun 2025 00:00:00 +0000 Ensure your container deployments are secure with a verified image signature. Trend Micro Research : Cloud Trend Micro Research : Compliance & Risks Trend Micro Research : How To Trend Micro Research : Articles, News, Reports Eduardo Golcman Keeping Pace and Embracing Emerging Technologies https://www.trendmicro.com/en_us/research/25/f/emerging-technologies-motorsport.html Research, News, and Perspective urn:uuid:dceb14d3-ecac-1ba9-9028-19d1f3f54f40 Mon, 09 Jun 2025 00:00:00 +0000 Trend Micro and the NEOM McLaren Formula E Team stay ahead of the curve by embracing new technologies, fostering a no-blame culture, and making split-second decisions in high-stakes environments. Trend Micro Research : Cyber Crime Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Expert Perspective Trend Micro Research : Video Trend Micro Research : Cyber Threats Robert McArdle NEOM McLaren Formula E Team & Trend Micro Innovation History https://www.trendmicro.com/en_us/research/25/f/neom-mclaren-innovation-history.html Research, News, and Perspective urn:uuid:d9b6b425-9b29-d41d-c14d-c4f4ab927b18 Fri, 06 Jun 2025 00:00:00 +0000 Explore how innovation becomes a team sport when Trend Micro and the NEOM McLaren Formula E Team leaders come together to talk culture, risk, and forward thinking. Trend Micro Research : Compliance & Risks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Expert Perspective Trend Micro Research : Video Trend Micro Research : Privacy & Risks Greg Young How Google’s Wiz Acquisition Impacts CNAPP https://www.trendmicro.com/en_us/research/25/f/google-wiz-acquisition-cnapp.html Research, News, and Perspective urn:uuid:eb1a91db-d1ee-68cc-e902-008050acdf68 Fri, 06 Jun 2025 00:00:00 +0000 Google aims to stake out a share of the CNAPP market and compete head-on against AWS and Microsoft Azure with its planned Wiz acquisition. What are the implications for companies invested in AWS and Azure cloud infrastructure? Trend Micro Research : Cloud Trend Micro Research : Articles, News, Reports Trend Micro Research : Expert Perspective Bestin Koruthu Threat Intelligence Sweeping now supports container security telemetry data https://www.trendmicro.com/en_us/research/25/f/vision-one-threat-intelligence-stops-threats.html Research, News, and Perspective urn:uuid:34d378fa-d0a0-05db-4811-8db5cdc3f0ab Fri, 06 Jun 2025 00:00:00 +0000 Threat Intelligence Sweeping starts to support sweep container security telemetry data. Users can now use the TI tool to identify possible malicious activity in their container-based environments. The trigger events are visible in workbench alert. Trend Micro Research : Cloud Trend Micro Research : APT & Targeted Attacks Trend Micro Research : How To Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Fernando Cardoso Driving Success on the Track or in the Boardroom https://www.trendmicro.com/en_us/research/25/f/driving-success-neom-mclaren.html Research, News, and Perspective urn:uuid:cb774f4b-b70f-7701-779c-cdddff6c0e2c Wed, 04 Jun 2025 00:00:00 +0000 Discover how the Trend Micro and the NEOM McLaren Formula E Team partnership is powered by a common vision for winning, on the track and in the boardroom. Trend Micro Research : Compliance & Risks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Expert Perspective Trend Micro Research : Video Trend Micro Research : Privacy & Risks Dhanya Thakkar Earth Lamia Develops Custom Arsenal to Target Multiple Industries https://www.trendmicro.com/en_us/research/25/e/earth-lamia.html Research, News, and Perspective urn:uuid:98e11ca8-ff51-ed95-c0a4-180c32b55239 Tue, 27 May 2025 00:00:00 +0000 Trend™ Research has been tracking an active APT threat actor named Earth Lamia, targeting multiple industries in Brazil, India and Southeast Asia countries at least since 2023. The threat actor primarily exploits vulnerabilities in web applications to gain access to targeted organizations. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Joseph C Chen