US - Research, News, and Perspectives http://feed.informer.com/digests/G5HRN3DTV4/feeder US - Research, News, and Perspectives Respective post owners and feed distributors Tue, 09 Nov 2021 16:45:03 +0000 Feed Informer http://feed.informer.com/ TIDRONE Targets Military and Satellite Industries in Taiwan https://www.trendmicro.com/en_us/research/24/i/tidrone-targets-military-and-satellite-industries-in-taiwan.html Research, News, and Perspective urn:uuid:d3733434-84c6-b442-4bec-41ad354849d4 Fri, 06 Sep 2024 00:00:00 +0000 Our research reveals that an unidentified threat cluster we named TIDRONE have shown significant interest in military-related industry chains, particularly in the manufacturers of drones. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Pierre Lee Banking Trojans: Mekotio Looks to Expand Targets, BBTok Abuses Utility Command https://www.trendmicro.com/en_us/research/24/i/banking-trojans-mekotio-looks-to-expand-targets--bbtok-abuses-ut.html Research, News, and Perspective urn:uuid:e1ce69de-02ed-8ec6-8301-fe517d3d8256 Thu, 05 Sep 2024 00:00:00 +0000 Notorious Mekotio and BBTok are having a resurgence targeting Latin American users. Mekotio’s latest variant suggests the gang behind it is broadening their target, while BBTok is seen abusing MSBuild.exe to evade detection. Trend Micro Research : Phishing Trend Micro Research : Articles, News, Reports Trend Micro Research : Research Mhica Romero Earth Lusca Uses KTLVdoor Backdoor for Multiplatform Intrusion https://www.trendmicro.com/en_us/research/24/i/earth-lusca-ktlvdoor.html Research, News, and Perspective urn:uuid:f512b169-aebc-9d64-dea9-700c3229a651 Wed, 04 Sep 2024 00:00:00 +0000 While monitoring Earth Lusca, we discovered the threat group’s use of KTLVdoor, a highly obfuscated multiplatform backdoor, as part of a large-scale attack campaign. Trend Micro Research : Malware Trend Micro Research : Articles, News, Reports Trend Micro Research : Research Cedric Pernet How AI Goes Rogue https://www.trendmicro.com/en_us/research/24/i/rogue-ai-part-2.html Research, News, and Perspective urn:uuid:267e2407-3d0d-a023-fdf2-11928e54f06b Tue, 03 Sep 2024 00:00:00 +0000 This is the second blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights. Trend Micro Research : Cloud Trend Micro Research : Cyber Crime Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Expert Perspective Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats AI Team Threat Actors Target the Middle East Using Fake Palo Alto GlobalProtect Tool https://www.trendmicro.com/en_us/research/24/h/threat-actors-target-middle-east-using-fake-tool.html Research, News, and Perspective urn:uuid:d69bcebd-0cb0-980c-99cb-773d6351d7ad Thu, 29 Aug 2024 00:00:00 +0000 Threat actors are targeting users in the Middle East by distributing sophisticated malware disguised as the Palo Alto GlobalProtect tool. Trend Micro Research : Malware Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Mohamed Fahmy AI Pulse: Sticker Shock, Rise of the Agents, Rogue AI https://www.trendmicro.com/en_us/research/24/h/agentic-ai-takeover.html Research, News, and Perspective urn:uuid:2d78f59f-9f3c-2a86-b522-9a55619ebe21 Thu, 29 Aug 2024 00:00:00 +0000 This issue of AI Pulse is all about agentic AI: what it is, how it works, and why security needs to be baked in from the start to prevent agentic AI systems from going rogue once they’re deployed. Trend Micro Research : Cloud Trend Micro Research : Latest News Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Trend Micro Research : Data center AI Team Cryptojacking via CVE-2023-22527: Dissecting a Full-Scale Cryptomining Ecosystem https://www.trendmicro.com/en_us/research/24/h/cve-2023-22527-cryptomining.html Research, News, and Perspective urn:uuid:d6eb49aa-8f60-59eb-7f51-a536dcb8d707 Wed, 28 Aug 2024 00:00:00 +0000 A technical analysis on how CVE-2023-22527 can be exploited by malicious actors for cryptojacking attacks that can spread across the victim’s system. Trend Micro Research : Malware Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Abdelrahman Esmail Complete Guide to Protecting Seven Attack Vectors https://www.trendmicro.com/en_us/research/22/k/cyber-attack-vectors-how-to-protect-them.html Research, News, and Perspective urn:uuid:935151e1-ede6-22ee-465e-7c39cc31cacf Tue, 27 Aug 2024 00:00:00 +0000 The quicker a cyberattack is identified, the less it costs. Jon Clay, VP of Threat Intelligence, reviews seven key initial attack vectors and provides proactive security tips to help you reduce cyber risk across the attack surface. Trend Micro Research : Cloud Trend Micro Research : Cyber Crime Trend Micro Research : Expert Perspective Trend Micro Research : Privacy & Risks Trend Micro Research : Cyber Threats Trend Micro Research : Compliance & Risks Trend Micro Research : Articles, News, Reports Jon Clay Confidence in GenAI: The Zero Trust Approach https://www.trendmicro.com/en_us/research/24/h/secure-genai.html Research, News, and Perspective urn:uuid:0e97fbff-717d-c5d3-40b9-835d9ed5154b Thu, 22 Aug 2024 00:00:00 +0000 Enterprises have gone all-in on GenAI, but the more they depend on AI models, the more risks they face. Trend Vision One™ – Zero Trust Secure Access (ZTSA) – AI Service Access bridges the gap between access control and GenAI services to protect the user journey. Trend Micro Research : Cloud Trend Micro Research : Privacy & Risks Trend Micro Research : Cyber Threats Trend Micro Research : Data center Trend Micro Research : Compliance & Risks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Network Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports Sara Atie Securing the Power of AI, Wherever You Need It https://www.trendmicro.com/en_us/research/24/h/security-ai.html Research, News, and Perspective urn:uuid:9f1a7f14-bfb9-207d-6c91-1ba796e2a22f Thu, 22 Aug 2024 00:00:00 +0000 Explore how generative AI is transforming cybersecurity and enterprise resilience Trend Micro Research : Cloud Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Expert Perspective Trend Micro Research : Articles, News, Reports Shannon Murphy How Trend Micro Managed Detection and Response Pressed Pause on a Play Ransomware Attack https://www.trendmicro.com/en_us/research/24/h/pressing-pause-on-play-ransomware.html Research, News, and Perspective urn:uuid:8cefee7d-46ca-c295-3c65-19149782977d Thu, 22 Aug 2024 00:00:00 +0000 Using the Trend Micro Vision One platform, our MDR team was able to quickly identify and contain a Play ransomware intrusion attempt. Trend Micro Research : Endpoints Trend Micro Research : Ransomware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trent Bessell Rogue AI is the Future of Cyber Threats https://www.trendmicro.com/en_us/research/24/h/rogue-ai-part-1.html Research, News, and Perspective urn:uuid:c443384c-2b7f-43e1-0c4f-e27a3d07c83f Thu, 15 Aug 2024 00:00:00 +0000 This is the first blog in a series on Rogue AI. Later articles will include technical guidance, case studies and more. Trend Micro Research : Cloud Trend Micro Research : Cyber Crime Trend Micro Research : Expert Perspective Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats AI Team A Dive into Earth Baku’s Latest Campaign https://www.trendmicro.com/en_us/research/24/h/earth-baku-latest-campaign.html Research, News, and Perspective urn:uuid:faeef7e7-494f-db01-c84f-cc6ff9c9f895 Fri, 09 Aug 2024 00:00:00 +0000 Earth Baku has broadened its scope from the Indo-Pacific region to Europe, the Middle East, and Africa. In this blog entry, we examine the threat actor's latest tools, tactics, and procedures. Trend Micro Research : Malware Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Ted Lee Bringing Security Back into Balance https://www.trendmicro.com/en_us/research/24/h/cybersecurity-balance.html Research, News, and Perspective urn:uuid:7048f99f-dab0-5d5d-4bf7-152ecf7d3f65 Sun, 04 Aug 2024 00:00:00 +0000 This article by Trend Micro CEO Eva Chen brings focus back to striking the cybersecurity strategies balance between business C-suite and information technology (IT) departments. Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Expert Perspective Trend Micro Research : Cyber Threats Trend Micro Research : Data center Trend Micro Research : Endpoints Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Network Trend Micro Research : Articles, News, Reports Eva Chen Cybersecurity Compass: An Integrated Cyber Defense Strategy https://www.trendmicro.com/en_us/research/24/h/cyber-defense-strategy-framework.html Research, News, and Perspective urn:uuid:e1a603f5-806c-be6d-875f-1289c4e9897d Fri, 02 Aug 2024 00:00:00 +0000 Explore how the Cybersecurity Compass can guide various security professionals' and stakeholders' decision-making before, during, and after a breach. Trend Micro Research : Cyber Crime Trend Micro Research : Web Trend Micro Research : Privacy & Risks Trend Micro Research : Cyber Threats Trend Micro Research : Endpoints Trend Micro Research : Network Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports Juan Pablo Castro Social Media Malvertising Campaign Promotes Fake AI Editor Website for Credential Theft https://www.trendmicro.com/en_us/research/24/h/malvertising-campaign-fake-ai-editor-website-credential-theft.html Research, News, and Perspective urn:uuid:d001398c-888d-ee48-b76d-6e0483ed8150 Thu, 01 Aug 2024 00:00:00 +0000 We uncovered a malvertising campaign where the threat actor hijacks social media pages, renames them to mimic popular AI photo editors, then posts malicious links to fake websites. Trend Micro Research : Malware Trend Micro Research : Cyber Crime Trend Micro Research : Research Trend Micro Research : Phishing Trend Micro Research : Cyber Threats Trend Micro Research : Endpoints Trend Micro Research : Articles, News, Reports Jaromir Horejsi AI-Powered Deepfake Tools Becoming More Accessible Than Ever https://www.trendmicro.com/en_us/research/24/g/ai-deepfake-cybercrime.html Research, News, and Perspective urn:uuid:18b20741-b026-8d52-834b-bf76daf7b338 Tue, 30 Jul 2024 00:00:00 +0000 Trend Micro research uncovers new cybercrime tools posing increased threats to security, highlighting the rapid evolution of AI-powered hacking services and their potential for mass exploitation Trend Micro Research : Cloud Trend Micro Research : Cyber Crime Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats AI Pulse: Brazil Gets Bold with Meta, Interpol’s Red Flag & more https://www.trendmicro.com/en_us/research/24/g/ai-regulation.html Research, News, and Perspective urn:uuid:9453d06d-863a-5787-9331-1643fcbeae34 Tue, 30 Jul 2024 00:00:00 +0000 The second edition of AI Pulse is all about AI regulation: what’s coming, why it matters, and what might happen without it. We look at Brazil’s hard não to Meta, how communities are pushing back against AI training data use, Interpol’s warnings about AI deepfakes, and more. Trend Micro Research : Cloud Trend Micro Research : Data center Trend Micro Research : Compliance & Risks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Network Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports AI Team How to Write a Generative AI Cybersecurity Policy https://www.trendmicro.com/en_us/research/24/g/write-generative-ai-cybersecurity-policy.html Research, News, and Perspective urn:uuid:364bd26c-7413-914b-4962-bb9f6c347ad8 Mon, 29 Jul 2024 00:00:00 +0000 It’s clear that generative AI is a permanent addition to the enterprise IT toolbox. For CISOs, the pressure is on to roll out AI security policies and technologies that can mitigate very real and present risks. Trend Micro Research : Cloud Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Web Trend Micro Research : Network Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports Greg Young QR Codes: Convenience or Cyberthreat? https://www.trendmicro.com/en_us/research/24/g/mitigate-risk-of-QR-code-phising-attacks.html Research, News, and Perspective urn:uuid:3e7495cb-8a56-b0e0-1a1a-f0a3eb164e7b Tue, 23 Jul 2024 00:00:00 +0000 Security awareness and measures to detect and prevent sophisticated risks associated with QR code-based phishing attacks (quishing) Trend Micro Research : Cloud Trend Micro Research : Web Trend Micro Research : Phishing Trend Micro Research : Ransomware Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports Sara Atie Why NDR is Key to Cyber 'Pest Control' https://www.trendmicro.com/en_us/research/24/g/ndr-key-to-cyber-pest-control.html Research, News, and Perspective urn:uuid:d540eb00-8cfc-fff0-ca2d-2c91831a8c69 Mon, 22 Jul 2024 00:00:00 +0000 Intruders are drawn to enterprise IT environments the way mice are attracted to houses. And once either kind of invader is inside, they can be hard to get out. Network detection and response (NDR) lets you trace intruders’ pathways to find out where they’re coming in—and seal the gaps. Trend Micro Research : Cyber Crime Trend Micro Research : Privacy & Risks Trend Micro Research : Cyber Threats Trend Micro Research : Endpoints Trend Micro Research : Network Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports Play Ransomware Group’s New Linux Variant Targets ESXi, Shows Ties With Prolific Puma https://www.trendmicro.com/en_us/research/24/g/new-play-ransomware-linux-variant-targets-esxi-shows-ties-with-p.html Research, News, and Perspective urn:uuid:79d076a6-d201-92a4-9cc7-9bb1f62a2b18 Fri, 19 Jul 2024 00:00:00 +0000 Trend Micro threat hunters discovered that the Play ransomware group has been deploying a new Linux variant that targets ESXi environments. Read our blog entry to know more. Trend Micro Research : Endpoints Trend Micro Research : Ransomware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Cj Arsley Mateo Trend Experts Weigh in on Global IT Outage Caused by CrowdStrike https://www.trendmicro.com/en_us/research/24/g/crowdstrike-windows-outage-insights.html Research, News, and Perspective urn:uuid:1dbe553f-b7ab-6062-3404-264de49622d0 Fri, 19 Jul 2024 00:00:00 +0000 On July 19, 2024, a large-scale outage emerged affecting Windows computers for many industries across the globe from financial institutions to hospitals to airlines. The source of this outage came from a single content update from CrowdStrike. Trend Micro Research : Cloud Trend Micro Research : Compliance & Risks Trend Micro Research : Endpoints Trend Micro Research : Expert Perspective Trend Micro Research : Articles, News, Reports Trend Micro Research : Data center The Potential Impact of the OpenSSH Vulnerabilities CVE-2024–6387 and CVE-2024-6409 https://www.trendmicro.com/en_us/research/24/g/cve-2024-6387-and-cve-2024-6409.html Research, News, and Perspective urn:uuid:3e510beb-3725-3f44-bc94-914ef254ca78 Wed, 17 Jul 2024 00:00:00 +0000 We check the OpenSSH vulnerabilities CVE-2024–6387 and CVE-2024-6409, examining their potential real-world impact and the possibility of exploitation for CVE-2024–6387 in x64 systems. Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Jagir Shastri Teaming up with IBM to secure critical SAP workloads https://www.trendmicro.com/en_us/research/24/g/trend-micro-ibm-power-integration.html Research, News, and Perspective urn:uuid:a8a194cb-756c-86b7-6661-4ef588378384 Tue, 16 Jul 2024 00:00:00 +0000 Trend Micro partners with IBM to offer advanced threat detection and response for protecting critical infrastructures running on IBM Power servers Trend Micro Research : Latest News Trend Micro Research : Compliance & Risks Trend Micro Research : Articles, News, Reports Trend Micro Research : Data center CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks https://www.trendmicro.com/en_us/research/24/g/CVE-2024-38112-void-banshee.html Research, News, and Perspective urn:uuid:2247c5cf-0c66-28c8-0d4d-e42d56b5d133 Mon, 15 Jul 2024 00:00:00 +0000 Our threat hunters discovered CVE-2024-38112, which was used as a zero-day by APT group Void Banshee, to access and execute files through the disabled Internet Explorer using MSHTML. We promptly identified and reported this zero-day vulnerability to Microsoft, and it has been patched. Trend Micro Research : Exploits & Vulnerabilities Peter Girnus An In-Depth Look at Crypto-Crime in 2023 Part 2 https://www.trendmicro.com/en_us/research/24/g/crypto-crime-2024-report-part-ii.html Research, News, and Perspective urn:uuid:c7f34542-5f13-4fb7-2f28-499ce534a312 Thu, 11 Jul 2024 00:00:00 +0000 In 2023, the cryptocurrency industry faced a significant increase in illicit activities, including money laundering, fraud, and ransomware attacks. Ransomware attacks were especially prevalent and profitable for attackers. However, other forms of criminal activity also saw a rise. Trend Micro Research : Malware Trend Micro Research : Cyber Crime Trend Micro Research : Reports Trend Micro Research : Privacy & Risks Trend Micro Research : Cyber Threats Trend Micro Research : ICS OT Trend Micro Research : Ransomware Trend Micro Research : Articles, News, Reports Network detection & response: the SOC stress reliever https://www.trendmicro.com/en_us/research/24/g/network-detection-response-2024.html Research, News, and Perspective urn:uuid:2bbebac1-744a-ceab-0015-f8c6a2812fc7 Tue, 09 Jul 2024 00:00:00 +0000 Cybersecurity teams are well-equipped to handle threats to technology assets that they manage. But with unmanaged devices providing ideal spots for attackers to lurk unseen, network detection and response capabilities have become vitally important. Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Cyber Threats Trend Micro Research : Endpoints Trend Micro Research : Network Trend Micro Research : Articles, News, Reports Trend Micro Research : Security Strategies Trend Micro Research An In-Depth Look at Crypto-Crime in 2023 Part 1 https://www.trendmicro.com/en_us/research/24/g/crypto-crime-2024-report-part-i.html Research, News, and Perspective urn:uuid:87e4262c-e883-45e2-c635-f6e8721b32d0 Mon, 08 Jul 2024 00:00:00 +0000 Cybersecurity is a growing concern in today's digital age, as more sensitive information is stored and transmitted online. With the rise of cryptocurrencies, there has also been a rise in crypto-crimes, which pose a significant threat to the security of both individuals and businesses. Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Ransomware Trend Micro Research : Privacy & Risks Trend Micro Research : Cyber Threats The Top 10 AI Security Risks Every Business Should Know https://www.trendmicro.com/en_us/research/24/g/top-ai-security-risks.html Research, News, and Perspective urn:uuid:4f022f54-014e-6293-da31-46c77d7f5c95 Mon, 08 Jul 2024 00:00:00 +0000 With every week bringing news of another AI advance, it’s becoming increasingly important for organizations to understand the risks before adopting AI tools. This look at 10 key areas of concern identified by the Open Worldwide Application Security Project (OWASP) flags risks enterprises should keep in mind through the back half of the year. Trend Micro Research : Cloud Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Network Trend Micro Research : Articles, News, Reports Trend Micro Research : Security Strategies Trend Micro Research : Data center Turning Jenkins Into a Cryptomining Machine From an Attacker's Perspective https://www.trendmicro.com/en_us/research/24/g/turning-jenkins-into-a-cryptomining-machine-from-an-attackers-pe.html Research, News, and Perspective urn:uuid:6fc9700f-e9ff-5127-3b4f-358630ca86a6 Fri, 05 Jul 2024 00:00:00 +0000 In this blog entry, we will discuss how the Jenkins Script Console can be weaponized by attackers for cryptomining activity if not configured properly. Trend Micro Research : Endpoints Trend Micro Research : Malware Trend Micro Research : Research Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Shubham Singh Mekotio Banking Trojan Threatens Financial Systems in Latin America https://www.trendmicro.com/en_us/research/24/g/mekotio-banking-trojan.html Research, News, and Perspective urn:uuid:7a958b58-e69f-2917-9a90-15475c0875ce Thu, 04 Jul 2024 00:00:00 +0000 We’ve recently seen a surge in attacks involving the Mekotio banking trojan. In this blog entry, we'll provide an overview of the trojan and what it does. Trend Micro Research : Malware Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Trend Micro Research Examining Water Sigbin's Infection Routine Leading to an XMRig Cryptominer https://www.trendmicro.com/en_us/research/24/f/water-sigbin-xmrig.html Research, News, and Perspective urn:uuid:a871ee9b-84e0-a340-ad08-392b3c94dc5f Fri, 28 Jun 2024 00:00:00 +0000 We analyze the multi-stage loading technique used by Water Sigbin to deliver the PureCrypter loader and XMRIG crypto miner. Trend Micro Research : Cloud Trend Micro Research : Malware Trend Micro Research : Research Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Ahmed Mohamed Ibrahim AI Pulse: Siri Says Hi to OpenAI, Deepfake Olympics & more https://www.trendmicro.com/en_us/research/24/f/cybersecurity-ai.html Research, News, and Perspective urn:uuid:23a83497-6fb0-2f50-53c2-a5c18fdda176 Fri, 28 Jun 2024 00:00:00 +0000 AI Pulse is a new blog series from Trend Micro on the latest cybersecurity AI news. In this edition: Siri says hi to OpenAI, fraud hogs the AI cybercrime spotlight, and why the Paris Olympics could be a hotbed of deepfakery. Trend Micro Research : Cloud Trend Micro Research : Latest News Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats AI Team ICO Scams Leverage 2024 Olympics to Lure Victims, Use AI for Fake Sites https://www.trendmicro.com/en_us/research/24/f/ico-scams-leverage-2024-olympics-to-lure-victims-use-ai-for-fake.html Research, News, and Perspective urn:uuid:09d32685-c5de-6757-063d-dbd94696270e Thu, 27 Jun 2024 00:00:00 +0000 In this blog we uncover threat actors using the 2024 Olympics to lure victims into investing in an initial coin offering (ICO). Similar schemes have been found to use AI-generated images for their fake ICO websites. Trend Micro Research : Cyber Crime Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Cedric Pernet Attackers in Profile: menuPass and ALPHV/BlackCat https://www.trendmicro.com/en_us/research/24/f/menupass-alphv-blackcat-threats.html Research, News, and Perspective urn:uuid:3f5c7507-1cec-1979-dc33-eed62e9160b0 Wed, 26 Jun 2024 00:00:00 +0000 To test the effectiveness of managed services like our Trend Micro managed detection and response offering, MITRE Engenuity™ combined the tools, techniques, and practices of two globally notorious bad actors: menuPass and ALPHV/BlackCat. This blog tells the story of why they were chosen and what makes them threats to be reckoned with. Trend Micro Research : Latest News Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats AI Coding Companions 2024: AWS, GitHub, Tabnine + More https://www.trendmicro.com/en_us/research/24/f/comparing-ai-coding-companions-2024.html Research, News, and Perspective urn:uuid:1b5aa2d5-5fd7-a128-7379-db6d48f42d89 Wed, 26 Jun 2024 00:00:00 +0000 AI coding companions are keeping pace with the high-speed evolution of generative AI overall, continually refining and augmenting their capabilities to make software development faster and easier than ever before. This blog looks at how the landscape is changing and key features of market-leading solutions from companies like AWS, GitHub, and Tabnine. Trend Micro Research : Cloud Trend Micro Research : Endpoints Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Network Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports Omdia Report: Trend Disclosed 60% of Vulnerabilities https://www.trendmicro.com/en_us/research/24/f/omdia-vulnerabilities-report.html Research, News, and Perspective urn:uuid:0f375545-0d4d-b322-ffa0-e90d1499e075 Tue, 25 Jun 2024 00:00:00 +0000 The latest Omdia Vulnerability Report shows Trend MicroTM Zero Day InitiativeTM (ZDI) spearheaded 60% of 2023 disclosures, underscoring its role in cybersecurity threat prevention. Trend Micro Research : Cloud Trend Micro Research : Reports Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Dustin Childs Worldwide 2023 Email Phishing Statistics and Examples https://www.trendmicro.com/en_us/research/24/f/worldwide-email-phishing-stats-examples-2023.html Research, News, and Perspective urn:uuid:0c4da366-579f-71ee-861c-cf92930eb4b3 Thu, 20 Jun 2024 00:00:00 +0000 Explore the need for going beyond built-in Microsoft 365 and Google Workspace™ security based on email threats detected in 2023. Trend Micro Research : Cyber Crime Trend Micro Research : Expert Perspective Trend Micro Research : Privacy & Risks Trend Micro Research : Articles, News, Reports Worldwide 2023 Email Phishing Statistics and Examples https://www.trendmicro.com/en_us/ciso/23/e/worldwide-email-phishing-stats-examples-2023.html CISO Resource Center urn:uuid:ec63e8d7-241b-8af3-7265-4d68f7a03967 Thu, 20 Jun 2024 00:00:00 +0000 Explore the need for going beyond built-in Microsoft 365 and Google Workspace™ security based on email threats detected in 2023. Trend Micro CISO : Digital Transformation Trend Micro CISO : Report Trend Micro CISO : Expert Perspective Trend Micro CISO : Risk Management Behind the Great Wall: Void Arachne Targets Chinese-Speaking Users With the Winos 4.0 C&C Framework https://www.trendmicro.com/en_us/research/24/f/behind-the-great-wall-void-arachne-targets-chinese-speaking-user.html Research, News, and Perspective urn:uuid:f015aa72-3f1a-914b-85a5-98d9dec112b1 Wed, 19 Jun 2024 00:00:00 +0000 We recently discovered a new threat actor group that we dubbed Void Arachne. This group targets Chinese-speaking users with malicious Windows Installer (MSI) files in a recent campaign. These MSI files contain legitimate software installer files for AI software and other popular software but are bundled with malicious Winos payloads. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Endpoints Trend Micro Research : Malware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Peter Girnus Not Just Another 100% Score: MITRE ENGENUITY ATT&CK https://www.trendmicro.com/en_us/research/24/f/mitre-enginuity-attack-evaluations.html Research, News, and Perspective urn:uuid:0a9c4ceb-41e9-f30c-d357-9dda89246625 Tue, 18 Jun 2024 00:00:00 +0000 The latest MITRE Engenuity ATT&CK Evaluations pitted leading managed detection and response (MDR) services against threats modeled on the menuPass and BlackCat/AlphV adversary groups. Trend Micro achieved 100% detection across all 15 major attack steps with an 86% actionable rate for those steps— balancing detections and business priorities including operational continuity and minimized disruption. Trend Micro Research : Cyber Crime Trend Micro Research : Cyber Threats Trend Micro Research : Exploits & Vulnerabilities Noodle RAT: Reviewing the Backdoor Used by Chinese-Speaking Groups https://www.trendmicro.com/en_us/research/24/f/noodle-rat-reviewing-the-new-backdoor-used-by-chinese-speaking-g.html Research, News, and Perspective urn:uuid:2aa9047b-8c48-84a8-58d8-cfe260f068f5 Tue, 11 Jun 2024 00:00:00 +0000 This blog entry provides an analysis of the Noodle RAT backdoor, which is likely being used by multiple Chinese-speaking groups engaged in espionage and other types of cybercrime. Trend Micro Research : Malware Trend Micro Research : Endpoints Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Hara Hiroaki Commando Cat: A Novel Cryptojacking Attack Abusing Docker Remote API Servers https://www.trendmicro.com/en_us/research/24/f/commando-cat-a-novel-cryptojacking-attack-.html Research, News, and Perspective urn:uuid:ee8e5fb5-d4bc-0efd-9341-0d39686c5415 Thu, 06 Jun 2024 00:00:00 +0000 We analyze a cryptojacking attack campaign exploiting exposed Docker remote API servers to deploy cryptocurrency miners, using Docker images from the open-source Commando project. Trend Micro Research : Cloud Trend Micro Research : Malware Trend Micro Research : Cyber Crime Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Sunil Bharti TargetCompany’s Linux Variant Targets ESXi Environments https://www.trendmicro.com/en_us/research/24/f/targetcompany-s-linux-variant-targets-esxi-environments.html Research, News, and Perspective urn:uuid:4ba2d3ad-afe2-6c77-4f7a-01643daf9081 Wed, 05 Jun 2024 00:00:00 +0000 In this blog entry, our researchers provide an analysis of TargetCompany ransomware’s Linux variant and how it targets VMware ESXi environments using new methods for payload delivery and execution. Trend Micro Research : Ransomware Darrel Tristan Virtusio SANS's 2024 Threat-Hunting Survey Review https://www.trendmicro.com/en_us/research/24/f/sans-2024-threat-hunting-survey-review.html Research, News, and Perspective urn:uuid:94081865-fb29-2807-6ccf-648ae7beff9d Tue, 04 Jun 2024 00:00:00 +0000 In its ninth year, the annual SANS Threat Hunting Survey delves into global organizational practices in threat hunting, shedding light on the challenges and adaptations in the landscape over the past year. Trend Micro Research : Reports Trend Micro Research : Privacy & Risks Trend Micro Research : ICS OT Trend Micro Research : Compliance & Risks Trend Micro Research : IoT Trend Micro Research : Network Trend Micro Research : Articles, News, Reports It's Time to Up-Level Your EDR Solution https://www.trendmicro.com/en_us/research/24/f/upgrade-edr-solution.html Research, News, and Perspective urn:uuid:749fba88-5fbc-7e80-dac4-7267b3ee6ab6 Mon, 03 Jun 2024 00:00:00 +0000 You may have EDR, but did you know you can add threat detection and response to improve a SecOps team’s efficiency and outcomes - read more. Trend Micro Research : Cloud Trend Micro Research : Cyber Crime Trend Micro Research : Privacy & Risks Trend Micro Research : Cyber Threats Trend Micro Research : Endpoints Trend Micro Research : Network Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports Guide to Better Extended Threat Detection and Response (XDR) https://www.trendmicro.com/en_us/ciso/22/k/threat-detection-response-guide.html CISO Resource Center urn:uuid:93b82508-709b-c701-16bd-50903f762851 Mon, 03 Jun 2024 00:00:00 +0000 Discover how XDR can enhance threat detection and response to improve a SecOps team’s efficiency and outcomes. Trend Micro CISO : Expert Perspective Trend Micro CISO : Skills Gap Trend Micro CISO : Compliance Trend Micro CISO : Risk Management Trend Micro CISO : Detection and Response Trend Micro CISO : Article Trend Micro CISO : Digital Transformation Trend Micro CISO : Cloud Trend Micro CISO : Cybersecurity Awareness Month Explore AI-Driven Cybersecurity with Trend Micro, Using NVIDIA NIM https://www.trendmicro.com/en_us/research/24/f/ai-cybersecurity-platform.html Research, News, and Perspective urn:uuid:af656540-0c25-30f6-41f6-1c4bd250807b Sun, 02 Jun 2024 00:00:00 +0000 Discover Trend Micro's integration of NVIDIA NIM to deliver an AI-driven cybersecurity solution for next-generation data centers. Engage with experts, explore demos, and learn strategies for securing AI data centers and optimizing cloud performance. Trend Micro Research : Cloud Trend Micro Research : Latest News Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Articles, News, Reports Trend Micro Research : Data center Decoding Water Sigbin's Latest Obfuscation Tricks https://www.trendmicro.com/en_us/research/24/e/decoding-8220-latest-obfuscation-tricks.html Research, News, and Perspective urn:uuid:6542c108-3538-9f4a-5029-b67c689379c0 Thu, 30 May 2024 00:00:00 +0000 Water Sigbin (aka the 8220 Gang) exploited the Oracle WebLogic vulnerabilities CVE-2017-3506 and CVE-2023-21839 to deploy a cryptocurrency miner using a PowerShell script. The threat actor also adopted new techniques to conceal its activities, making attacks harder to defend against. Trend Micro Research : Cloud Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Trend Micro Research : Reports Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Endpoints Trend Micro Research : Articles, News, Reports Sunil Bharti