US - Research, News, and Perspectives http://feed.informer.com/digests/G5HRN3DTV4/feeder US - Research, News, and Perspectives Respective post owners and feed distributors Tue, 09 Nov 2021 16:45:03 +0000 Feed Informer http://feed.informer.com/ Python-Based NodeStealer Version Targets Facebook Ads Manager https://www.trendmicro.com/en_us/research/24/l/python-based-nodestealer.html Research, News, and Perspective urn:uuid:6d380b53-30d1-17da-2558-a878f0b619e3 Thu, 19 Dec 2024 00:00:00 +0000 In this blog entry, Trend Micro’s Managed XDR team discuss their investigation into how the latest variant of NodeStealer is delivered through spear-phishing attacks, potentially leading to malware execution, data theft, and the exfiltration of sensitive information via Telegram. Trend Micro Research : Malware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Aira Marcelo FedRAMP ATO Boosts Zero Trust for Federal Agencies https://www.trendmicro.com/en_us/research/24/l/fedramp-ato-zero-trust.html Research, News, and Perspective urn:uuid:0a91ae2c-f775-65ca-bdf9-8ed581fc7b84 Thu, 19 Dec 2024 00:00:00 +0000 Trend Vision One™ for Government has obtained a FedRAMP Authorization to Operate (ATO). This milestone enables Federal government customers to leverage Trend’s platform to rapidly stop adversaries and control their cybersecurity risk posture. Trend Micro Research : Cloud Trend Micro Research : Latest News Trend Micro Research : Compliance & Risks Trend Micro Research : Endpoints Trend Micro Research : Network Link Trap: GenAI Prompt Injection Attack https://www.trendmicro.com/en_us/research/24/l/genai-prompt-injection-attack-threat.html Research, News, and Perspective urn:uuid:ddace753-405c-ade3-7a00-13a35cdf9f5e Tue, 17 Dec 2024 00:00:00 +0000 Prompt injection exploits vulnerabilities in generative AI to manipulate its behavior, even without extensive permissions. This attack can expose sensitive data, making awareness and preventive measures essential. Learn how it works and how to stay protected. Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Cyber Threats Trend Micro Research : Data center Trend Micro Research : Endpoints Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Network Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports Jay Liao Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion https://www.trendmicro.com/en_us/research/24/l/darkgate-malware.html Research, News, and Perspective urn:uuid:bbca78ca-12a5-1156-d3e7-9cc32d5d4818 Fri, 13 Dec 2024 00:00:00 +0000 In this blog entry, we discuss a social engineering attack that tricked the victim into installing a remote access tool, triggering DarkGate malware activities and an attempted C&C connection. Trend Micro Research : Latest News Trend Micro Research : Cyber Threats Trend Micro Research : Research Catherine Loveria INTERPOL & Trend's Fight Against Cybercrime https://www.trendmicro.com/en_us/research/24/l/interpol-cybercrime.html Research, News, and Perspective urn:uuid:103c9f0c-36c3-971d-ab6a-c46a57742f9c Thu, 12 Dec 2024 00:00:00 +0000 Trend threat intelligence and training were crucial to the success of two major policing operations in 2024 Trend Micro Research : Cloud Trend Micro Research : Latest News Trend Micro Research : Cyber Crime Trend Micro Research : Cyber Threats Trend Micro Research : Infographic Jon Clay MITRE ATT&CK 2024 Results for Enterprise Security https://www.trendmicro.com/en_us/research/24/l/mitre-attack-results-enterprise-security-2024.html Research, News, and Perspective urn:uuid:56007f7f-715e-eca5-15e2-ca757303c6e9 Mon, 09 Dec 2024 00:00:00 +0000 Enterprise 2024 will incorporate multiple, smaller emulations for a more nuanced and targeted evaluation of defensive capabilities. We’re excited to offer two distinct adversary focus areas: Ransomware targeting Windows and Linux, and the Democratic People's Republic of Korea's targeting macOS. Trend Micro Research : Cloud Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Reports Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Endpoints Trend Micro Research : Ransomware Trend Micro Research : Network Trend Micro Research : Articles, News, Reports Mike Grodzki MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks https://www.trendmicro.com/en_us/research/24/l/earth-minotaur.html Research, News, and Perspective urn:uuid:48059e43-12ed-69ea-594f-709baf195d26 Thu, 05 Dec 2024 00:00:00 +0000 Trend Micro’s monitoring of the MOONSHINE exploit kit revealed how it’s used by the threat actor Earth Minotaur to exploit Android messaging app vulnerabilities and install the DarkNimbus backdoor for surveillance. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Joseph C Chen The Road to Agentic AI: Exposed Foundations https://www.trendmicro.com/en_us/research/24/k/agentic-ai.html Research, News, and Perspective urn:uuid:8c2b6a12-3acb-f67d-f3c5-193a1942952c Wed, 04 Dec 2024 00:00:00 +0000 Our research into Retrieval Augmented Generation (RAG) systems uncovered at least 80 unprotected servers. We highlight this problem, which can lead to potential data loss and unauthorized access. Trend Micro Research : Cloud Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Morton Swimmer Gafgyt Malware Broadens Its Scope in Recent Attacks https://www.trendmicro.com/en_us/research/24/l/gafgyt-malware-targeting-docker-remote-api-servers.html Research, News, and Perspective urn:uuid:1cb1cca2-4b3e-e17b-8e55-89568f33f1c5 Tue, 03 Dec 2024 00:00:00 +0000 Our researchers identified threat actors exploiting misconfigured Docker servers to spread the Gafgyt malware. This threat traditionally targets IoT devices; this new tactic signals a change in its behavior. Trend Micro Research : Cloud Trend Micro Research : Malware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Sunil Bharti World Tour Survey: IT Operations’ Hands-on Defense https://www.trendmicro.com/en_us/research/24/l/world-tour-cybersecurity-survey-it-defense.html Research, News, and Perspective urn:uuid:c6ecebc0-0a0c-b45a-cbf0-cf2ed69fa6b0 Mon, 02 Dec 2024 00:00:00 +0000 Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what IT operations teams had to say. Trend Micro Research : Cyber Crime Trend Micro Research : Web Trend Micro Research : Research Trend Micro Research : Cyber Threats Trend Micro Research : Compliance & Risks Trend Micro Research : Endpoints Trend Micro Research : Network Trend Micro Research : Articles, News, Reports AI Configuration Best Practices to address AI Security Risks https://www.trendmicro.com/en_us/research/24/k/ai-configuration-best-practices.html Research, News, and Perspective urn:uuid:bdf9bbba-2335-5903-5eea-8acfdd099314 Mon, 02 Dec 2024 00:00:00 +0000 AI usage is on the rise as many companies are adopting AI for productivity gains and creation of new business opportunities which provide value to their customers. Trend Micro Research : Cloud Trend Micro Research : How To Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Privacy & Risks Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Joy Ngaruro AI Pulse: The Good from AI and the Promise of Agentic https://www.trendmicro.com/en_us/research/24/l/good-agentic-ai.html Research, News, and Perspective urn:uuid:111ac01c-2bdf-2ea2-91cd-602c8e3907a4 Sun, 01 Dec 2024 00:00:00 +0000 The perils of AI get a lot of airtime, but what are the upsides? This issue of AI Pulse looks at some of the good AI can bring, from strengthening cybersecurity to driving health breakthroughs—and how the coming wave of agentic AI is going to take those possibilities to a whole new level. Trend Micro Research : Latest News Trend Micro Research : Cyber Crime Trend Micro Research : Web Trend Micro Research : Cyber Threats Trend Micro Research : Endpoints Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Mobile Trend Micro Research : Articles, News, Reports AI Team Guess Who’s Back - The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024 https://www.trendmicro.com/en_us/research/24/k/return-of-anel-in-the-recent-earth-kasha-spearphishing-campaign.html Research, News, and Perspective urn:uuid:6f3236a8-4564-87c2-9860-6db0873c7b5c Tue, 26 Nov 2024 00:00:00 +0000 Trend Micro has identified a spear-phishing campaign active in Japan since June 2024. Evidence about the malware used by this campaign suggests this was part of a new operation by Earth Kasha. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Hara Hiroaki Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions https://www.trendmicro.com/en_us/research/24/k/earth-estries.html Research, News, and Perspective urn:uuid:c74084d4-5fae-a65e-557f-c6528ab93863 Mon, 25 Nov 2024 00:00:00 +0000 Since 2023, APT group Earth Estries has aggressively targeted key industries globally with sophisticated techniques and new backdoors, like GHOSTSPIDER and MASOL RAT, for prolonged espionage operations. Trend Micro Research : Latest News Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Research Leon M Chang Embracing a Risk-Based Cybersecurity Approach With ASRM https://www.trendmicro.com/en_us/research/22/d/proactive-cyber-risk-management-strategies.html Research, News, and Perspective urn:uuid:2d89872a-4877-b4bf-92fe-108aa1520b15 Mon, 25 Nov 2024 00:00:00 +0000 Explore how a risk-based cybersecurity approach is critical to proactively stopping dynamic, ever-evolving threats Trend Micro Research : Cyber Crime Trend Micro Research : Expert Perspective Trend Micro Research : Privacy & Risks Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Juan Pablo Castro Spot the Difference: Earth Kasha's New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella https://www.trendmicro.com/en_us/research/24/k/lodeinfo-campaign-of-earth-kasha.html Research, News, and Perspective urn:uuid:25548714-aaa2-d531-a4bc-cf505751165b Tue, 19 Nov 2024 00:00:00 +0000 LODEINFO is a malware used in attacks targeting mainly Japan since 2019. Trend Micro has been tracking the group as Earth Kasha. We have identified a new campaign connected to this group with significant updates to their strategy, tactics, and arsenals. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Hara Hiroaki Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices https://www.trendmicro.com/en_us/research/24/k/water-barghest.html Research, News, and Perspective urn:uuid:03389c34-df1d-28eb-b167-ec6bc11f7c51 Mon, 18 Nov 2024 00:00:00 +0000 In this blog entry, we discuss Water Barghest's exploitation of IoT devices, transforming them into profitable assets through advanced automation and monetization techniques. Trend Micro Research : Articles, News, Reports Trend Micro Research : Threats Trend Micro Research : IoT Feike Hacquebord 5 AI Security Takeaways featuring Forrester https://www.trendmicro.com/en_us/research/24/j/forrester-ai-security.html Research, News, and Perspective urn:uuid:f35d0f94-6a43-d9e4-68c0-3e9983879245 Wed, 13 Nov 2024 00:00:00 +0000 Highlights from the recent discussion between Trend Micro’s David Roth, CRO Enterprise America, and guest speaker Jeff Pollard, VP, Principal Analyst, Forrester about AI hype versus reality and how to secure AI in the workplace. Trend Micro Research : Cyber Crime Trend Micro Research : Web Trend Micro Research : Cyber Threats Trend Micro Research : Endpoints Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Video Trend Micro Research : Network Trend Micro Research : Security Strategies Trend Micro and Japanese Partners Reveal Hidden Connections Among SEO Malware Operations https://www.trendmicro.com/en_us/research/24/k/seo-malware.html Research, News, and Perspective urn:uuid:884a37d8-b7ca-88ff-6f03-1fb493fd72fc Mon, 11 Nov 2024 00:00:00 +0000 Trend Micro researchers, in collaboration with Japanese authorities, analyzed links between SEO malware families used in SEO poisoning attacks that lead users to fake shopping sites. Trend Micro Research : Latest News Trend Micro Research : Articles, News, Reports Trend Micro Research : Research Makoto Shimamura Breaking Down Earth Estries' Persistent TTPs in Prolonged Cyber Operations https://www.trendmicro.com/en_us/research/24/k/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-o.html Research, News, and Perspective urn:uuid:af1eafb5-cda0-7f9a-5e6d-f97a0ec28008 Fri, 08 Nov 2024 00:00:00 +0000 Discover how Earth Estries employs a diverse set of tactics, techniques, and tools, including malware such as Zingdoor and Snappybee, for its campaigns. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Ted Lee SOC Around the Clock: World Tour Survey Findings https://www.trendmicro.com/en_us/research/24/k/world-tour-survey-results.html Research, News, and Perspective urn:uuid:10b943f8-9051-4487-c9b5-be7eb9a15758 Mon, 04 Nov 2024 00:00:00 +0000 Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what SOC teams had to say. Trend Micro Research : Cyber Crime Trend Micro Research : Web Trend Micro Research : Research Trend Micro Research : Cyber Threats Trend Micro Research : Compliance & Risks Trend Micro Research : Endpoints Trend Micro Research : Network Trend Micro Research : Articles, News, Reports AI Pulse: Election Deepfakes, Disasters, Scams & more https://www.trendmicro.com/en_us/research/24/j/ai-election-deepfakes.html Research, News, and Perspective urn:uuid:4dc03d90-284f-017a-ac09-fac067859e5e Thu, 31 Oct 2024 00:00:00 +0000 In the final weeks before November’s U.S. election, cybersecurity experts were calling October 2024 the “month of mischief”—a magnet for bad actors looking to disrupt the democratic process through AI-generated misinformation. This issue of AI Pulse looks at what can be done about deepfakes and other AI scams, and why defense-in-depth is the only way to go. Trend Micro Research : Cyber Crime Trend Micro Research : Web Trend Micro Research : Social Media Trend Micro Research : Expert Perspective Trend Micro Research : Cyber Threats Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Mobile Trend Micro Research : Articles, News, Reports AI Team Attacker Abuses Victim Resources to Reap Rewards from Titan Network https://www.trendmicro.com/en_us/research/24/j/titan-network.html Research, News, and Perspective urn:uuid:8edc3119-2f51-38e1-b313-3da653f550c9 Wed, 30 Oct 2024 00:00:00 +0000 In this blog entry, we discuss how an attacker took advantage of the Atlassian Confluence vulnerability CVE-2023-22527 to connect servers to the Titan Network for cryptomining purposes. Trend Micro Research : Articles, News, Reports Trend Micro Research : Research Trend Micro Research : Cyber Threats Ranga Duraisamy Understanding the Initial Stages of Web Shell and VPN Threats: An MXDR Analysis https://www.trendmicro.com/en_us/research/24/j/understanding-the-initial-stages-of-web-shell-and-vpn-threats-an.html Research, News, and Perspective urn:uuid:8825e60f-210b-f30c-06b8-971e0d1a4f46 Thu, 24 Oct 2024 00:00:00 +0000 While cyberattacks that employ web shells and VPN compromise are not particularly novel, they are still prevalent. The recent incidents that Trend Micro MXDR analyzed highlight the importance of behavioral analysis and anomaly detection in security measures. Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Ryan Maglaque Unmasking Prometei: A Deep Dive Into Our MXDR Findings https://www.trendmicro.com/en_us/research/24/j/unmasking-prometei-a-deep-dive-into-our-mxdr-findings.html Research, News, and Perspective urn:uuid:411acf7b-ecec-eaea-c071-9730dafb519a Wed, 23 Oct 2024 00:00:00 +0000 How does Prometei insidiously operate in a compromised system? This Managed Extended Detection and Response investigation conducted with the help of Trend Vision One provides a comprehensive analysis of the inner workings of this botnet so users can stop the threat in its tracks before it inflicts damage to the system. Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Buddy Tancio Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach https://www.trendmicro.com/en_us/research/24/j/using-grpc-http-2-for-cryptominer-deployment.html Research, News, and Perspective urn:uuid:c8c5f712-a362-e7a1-0574-c3396854d0dd Tue, 22 Oct 2024 00:00:00 +0000 In this blog entry, we discuss how malicious actors are exploiting Docker remote API servers via gRPC/h2c to deploy the cryptominer SRBMiner to facilitate their mining of XRP on Docker hosts. Trend Micro Research : Latest News Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Abdelrahman Esmail Attackers Target Exposed Docker Remote API Servers With perfctl Malware https://www.trendmicro.com/en_us/research/24/j/attackers-target-exposed-docker-remote-api-servers-with-perfctl-.html Research, News, and Perspective urn:uuid:4e46276f-3fff-7942-cad5-52b9ccf82194 Mon, 21 Oct 2024 00:00:00 +0000 We observed an unknown threat actor abusing exposed Docker remote API servers to deploy the perfctl malware. Trend Micro Research : Cloud Trend Micro Research : Malware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Sunil Bharti Gartner 2024 CNAPP Market Guide Insights for Leaders https://www.trendmicro.com/en_us/research/24/j/gartner-2024-cnapp-market-guide.html Research, News, and Perspective urn:uuid:e3e8ad5e-3d59-e8b8-abd8-9037029efa81 Fri, 18 Oct 2024 00:00:00 +0000 As businesses increasingly pivot to cloud-native applications, the landscape of cybersecurity becomes ever more challenging. Trend Micro Research : Cloud Trend Micro Research : Compliance & Risks Trend Micro Research : Reports Trend Micro Research : Privacy & Risks Trend Micro Research : Articles, News, Reports How to Mitigate the Impact of Rogue AI Risks https://www.trendmicro.com/en_us/research/24/j/mitigate-rogue-ai-risks.html Research, News, and Perspective urn:uuid:d1387812-8ed6-a7f4-ba17-6d867ccb4f92 Thu, 17 Oct 2024 00:00:00 +0000 This is the latest blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights. Trend Micro Research : Cloud Trend Micro Research : Cyber Crime Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Expert Perspective Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats AI Team Fake LockBit, Real Damage: Ransomware Samples Abuse Amazon S3 to Steal Data https://www.trendmicro.com/en_us/research/24/j/fake-lockbit-real-damage-ransomware-samples-abuse-aws-s3-to-stea.html Research, News, and Perspective urn:uuid:8949ce10-4ab1-cc55-923b-3464cd19ada3 Wed, 16 Oct 2024 00:00:00 +0000 This article uncovers a Golang ransomware abusing Amazon S3 for data theft, and masking as LockBit to further pressure victims. The discovery of hard-coded AWS credentials in these samples led to AWS account suspensions. Trend Micro Research : Cloud Trend Micro Research : Ransomware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Jaromir Horejsi Silent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions https://www.trendmicro.com/en_us/research/24/j/edrsilencer-disrupting-endpoint-security-solutions.html Research, News, and Perspective urn:uuid:1be85902-d0e9-109f-09ba-a6ddef18598b Tue, 15 Oct 2024 00:00:00 +0000 Trend Micro's Threat Hunting Team has observed EDRSilencer, a red team tool that threat actors are attempting to abuse for its ability to block EDR traffic and conceal malicious activity. Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Trend Micro Research : Research Jacob Santos Water Makara Uses Obfuscated JavaScript in Spear Phishing Campaign, Targets Brazil With Astaroth Malware https://www.trendmicro.com/en_us/research/24/j/water-makara-uses-obfuscated-javascript-in-spear-phishing-campai.html Research, News, and Perspective urn:uuid:70d0c294-6cbf-357c-2f72-aa0d1b449844 Mon, 14 Oct 2024 00:00:00 +0000 Trend Micro researchers have uncovered a surge of malicious activities involving a threat actor group that we track as Water Makara. This group is targeting enterprises in Brazil, deploying banking malware using obfuscated JavaScript to slip past security defenses. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Charles Adrian Marty Earth Simnavaz (aka APT34) Levies Advanced Cyberattacks Against Middle East https://www.trendmicro.com/en_us/research/24/j/earth-simnavaz-cyberattacks.html Research, News, and Perspective urn:uuid:91f88f28-9e9c-cd4f-ce12-bde1ef5ee214 Fri, 11 Oct 2024 00:00:00 +0000 Trend Micro's investigation into the recent activity of Earth Simnavaz provides new insights into the APT group’s evolving tactics and the immediate threat it poses to sectors in the Middle East. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Articles, News, Reports Trend Micro Research : Research Mohamed Fahmy Harnessing AI for Enhanced Security https://www.trendmicro.com/en_us/research/24/j/enhanced-security-ai.html Research, News, and Perspective urn:uuid:138074db-0a05-a0f5-0e37-bcf05509a19a Tue, 08 Oct 2024 00:00:00 +0000 A deep-dive into how AI-driven solutions from Trend Micro leveraging the NVIDIA AI Enterprise software platform are elevating security across critical industries Trend Micro Research : Cloud Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Expert Perspective Trend Micro Research : Cyber Threats Trend Micro Research : Data center Fernando Cardoso Rogue AI: What the Security Community is Missing https://www.trendmicro.com/en_us/research/24/j/rogue-ai-part-4.html Research, News, and Perspective urn:uuid:d6e79b22-6478-3b4a-bc18-daefd14868ce Thu, 03 Oct 2024 00:00:00 +0000 This is the fourth blog post in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights. Trend Micro Research : Cloud Trend Micro Research : Cyber Crime Trend Micro Research : Expert Perspective Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats AI Team MDR in Action: Preventing The More_eggs Backdoor From Hatching https://www.trendmicro.com/en_us/research/24/i/mdr-in-action--preventing-the-moreeggs-backdoor-from-hatching--.html Research, News, and Perspective urn:uuid:9bfb3796-2ba1-56df-f461-fd61c7b35372 Mon, 30 Sep 2024 00:00:00 +0000 Trend Micro MDR (Managed Detection and Response) team promptly mitigated a more_eggs infection. Using Vision One, MDR illustrated how Custom Filters/Models and Security Playbook can be used to automate the response to more_eggs and similar threats. Trend Micro Research : Phishing Trend Micro Research : Malware Trend Micro Research : Articles, News, Reports Ryan Soliven AI Pulse: What's new in AI regulations? https://www.trendmicro.com/en_us/research/24/i/ai-regulations-2024.html Research, News, and Perspective urn:uuid:a5118c4c-5008-28a9-9c17-696b4e75640b Mon, 30 Sep 2024 00:00:00 +0000 Fall is in the air and frameworks for mitigating AI risk are dropping like leaves onto policymakers’ desks. From California’s SB 1047 bill and NIST’s model-testing deal with OpenAI and Anthropic to REAIM’s blueprint for military AI governance, AI regulation is proving to be a hot and complicated topic. Trend Micro Research : Cloud Trend Micro Research : Latest News Trend Micro Research : Cyber Crime Trend Micro Research : Web Trend Micro Research : Cyber Threats Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Network Trend Micro Research : Articles, News, Reports AI Team Trend Detects NVIDIA AI Toolkit Vulnerability https://www.trendmicro.com/en_us/research/24/i/nvidia-ai-container-toolkit-vulnerability-fix.html Research, News, and Perspective urn:uuid:d549be3f-8101-61ff-a13c-f13a01e5d87e Fri, 27 Sep 2024 00:00:00 +0000 On Wednesday, NVIDIA released updates to fix a critical vulnerability in its NVIDIA Container Toolkit, which, if exploited, could put a wide range of AI infrastructure and underlying data/secrets at risk. Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Trend Micro Research : Data center Cybersecurity Compass: Bridging the Communication Gap https://www.trendmicro.com/en_us/research/24/i/cybersecurity-compass.html Research, News, and Perspective urn:uuid:d2d855c4-9d65-fb57-ee25-925a03fda760 Thu, 26 Sep 2024 00:00:00 +0000 Discover how to use the Cybersecurity Compass to foster effective conversations about cybersecurity strategy between non-technical and technical audiences, focusing on the phases of before, during, and after a breach. Trend Micro Research : Cyber Crime Trend Micro Research : Web Trend Micro Research : Privacy & Risks Trend Micro Research : Cyber Threats Trend Micro Research : Endpoints Trend Micro Research : Network Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports Juan Pablo Castro Inaugural World Tour 2024 Survey Findings https://www.trendmicro.com/en_us/research/24/i/world-tour-2024-survey.html Research, News, and Perspective urn:uuid:36ac91b8-59c6-52e4-479e-2e450eb6b35a Thu, 26 Sep 2024 00:00:00 +0000 Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what CISOs had to say. Trend Micro Research : Cloud Trend Micro Research : Cyber Crime Trend Micro Research : Reports Trend Micro Research : Privacy & Risks Trend Micro Research : Cyber Threats Trend Micro Research : Report Trend Micro Research : Endpoints Trend Micro Research : Network Evolved Exploits Call for AI-Driven ASRM + XDR https://www.trendmicro.com/en_us/research/24/i/ai-asrm-xdr.html Research, News, and Perspective urn:uuid:8d5976b0-6b25-a95c-ca0e-0322b5177f9a Tue, 24 Sep 2024 00:00:00 +0000 AI-driven insights for managing emerging threats and minimizing organizational risk Trend Micro Research : Cloud Trend Micro Research : Compliance & Risks Trend Micro Research : Expert Perspective Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Jon Clay How Ransomhub Ransomware Uses EDRKillShifter to Disable EDR and Antivirus Protections https://www.trendmicro.com/en_us/research/24/i/how-ransomhub-ransomware-uses-edrkillshifter-to-disable-edr-and-.html Research, News, and Perspective urn:uuid:157137dc-64c5-5b36-ebf3-f10bf61ccde6 Fri, 20 Sep 2024 00:00:00 +0000 Trend Micro tracked this group as Water Bakunawa, behind the RansomHub ransomware, employs various anti-EDR techniques to play a high-stakes game of hide and seek with security solutions. Trend Micro Research : Endpoints Trend Micro Research : Ransomware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Kyle Philippe Yu Earth Baxia Uses Spear-Phishing and GeoServer Exploit to Target APAC https://www.trendmicro.com/en_us/research/24/i/earth-baxia-spear-phishing-and-geoserver-exploit.html Research, News, and Perspective urn:uuid:1ba9287e-a244-50b3-736d-5c2f37476c69 Thu, 19 Sep 2024 00:00:00 +0000 We observed Earth Baxia carrying out targeted attacks against APAC countries that involved advanced techniques like spear-phishing and customized malware, with data suggesting that the group operates from China. Trend Micro Research : Phishing Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Articles, News, Reports Ted Lee Identifying Rogue AI https://www.trendmicro.com/en_us/research/24/i/rogue-ai-part-3.html Research, News, and Perspective urn:uuid:4441f410-7fad-454a-0e65-9862a578d15a Thu, 19 Sep 2024 00:00:00 +0000 This is the third blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights. Trend Micro Research : Cloud Trend Micro Research : Cyber Crime Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Expert Perspective Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats AI Team Vulnerabilities in Cellular Packet Cores Part IV: Authentication https://www.trendmicro.com/en_us/research/24/i/vulnerabilities-in-cellular-packet-cores-part-iv-authentication.html Research, News, and Perspective urn:uuid:9229791b-41da-b5ff-cf4b-71de17f04643 Wed, 18 Sep 2024 00:00:00 +0000 Our research reveals two significant vulnerabilities in Microsoft Azure Private 5G Core (AP5GC). The first vulnerability (CVE-2024-20685) allows a crafted signaling message to crash the control plane, leading to potential service outages. The second (ZDI-CAN-23960) disconnects and replaces attached base stations, disrupting network operations. While these issues are implementation-specific, their exploitation is made possible by a systemic weakness: the lack of mandatory authentication procedures between base stations and packet-cores. Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Trend Micro Research : Network Trend Micro Research : Articles, News, Reports Richard Y Lin Protecting Against RCE Attacks Abusing WhatsUp Gold Vulnerabilities https://www.trendmicro.com/en_us/research/24/i/whatsup-gold-rce.html Research, News, and Perspective urn:uuid:aac20ec2-ae7d-8418-ecf0-ef3ef68e2b21 Thu, 12 Sep 2024 00:00:00 +0000 In this blog entry, we provide an analysis of the recent remote code execution attacks related to Progress Software’s WhatsUp Gold that possibly abused the vulnerabilities CVE-2024-6670 and CVE-2024-6671. Trend Micro Research : Articles, News, Reports Trend Micro Research : Research Trend Micro Research : Exploits & Vulnerabilities Hitomi Kimura Earth Preta Evolves its Attacks with New Malware and Strategies https://www.trendmicro.com/en_us/research/24/i/earth-preta-new-malware-and-strategies.html Research, News, and Perspective urn:uuid:2c898e8e-392f-f12f-cd3a-b5bda1c7fe45 Mon, 09 Sep 2024 00:00:00 +0000 In this blog entry, we discuss our analysis of Earth Preta’s enhancements in their attacks by introducing new tools, malware variants and strategies to their worm-based attacks and their time-sensitive spear-phishing campaign. Trend Micro Research : Malware Trend Micro Research : Articles, News, Reports Trend Micro Research : Research Lenart Bermejo TIDRONE Targets Military and Satellite Industries in Taiwan https://www.trendmicro.com/en_us/research/24/i/tidrone-targets-military-and-satellite-industries-in-taiwan.html Research, News, and Perspective urn:uuid:d3733434-84c6-b442-4bec-41ad354849d4 Fri, 06 Sep 2024 00:00:00 +0000 Our research reveals that an unidentified threat cluster we named TIDRONE have shown significant interest in military-related industry chains, particularly in the manufacturers of drones. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Pierre Lee Banking Trojans: Mekotio Looks to Expand Targets, BBTok Abuses Utility Command https://www.trendmicro.com/en_us/research/24/i/banking-trojans-mekotio-looks-to-expand-targets--bbtok-abuses-ut.html Research, News, and Perspective urn:uuid:e1ce69de-02ed-8ec6-8301-fe517d3d8256 Thu, 05 Sep 2024 00:00:00 +0000 Notorious Mekotio and BBTok are having a resurgence targeting Latin American users. Mekotio’s latest variant suggests the gang behind it is broadening their target, while BBTok is seen abusing MSBuild.exe to evade detection. Trend Micro Research : Phishing Trend Micro Research : Articles, News, Reports Trend Micro Research : Research Mhica Romero Earth Lusca Uses KTLVdoor Backdoor for Multiplatform Intrusion https://www.trendmicro.com/en_us/research/24/i/earth-lusca-ktlvdoor.html Research, News, and Perspective urn:uuid:f512b169-aebc-9d64-dea9-700c3229a651 Wed, 04 Sep 2024 00:00:00 +0000 While monitoring Earth Lusca, we discovered the threat group’s use of KTLVdoor, a highly obfuscated multiplatform backdoor, as part of a large-scale attack campaign. Trend Micro Research : Malware Trend Micro Research : Articles, News, Reports Trend Micro Research : Research Cedric Pernet