US - Research, News, and Perspectives http://feed.informer.com/digests/G5HRN3DTV4/feeder US - Research, News, and Perspectives Respective post owners and feed distributors Tue, 09 Nov 2021 16:45:03 +0000 Feed Informer http://feed.informer.com/ U.S. Public Sector Under Siege https://www.trendmicro.com/en_us/research/26/b/us-public-sector-under-siege.html Research, News, and Perspective urn:uuid:29760f73-d471-2ebe-b337-5d1df968af19 Fri, 06 Feb 2026 00:00:00 +0000 Discover why Government and Education must prioritize Cyber Risk Management. Trend Micro Research : Compliance & Risks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Expert Perspective Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Jon Clay PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups https://www.trendmicro.com/en_us/research/26/a/peckbirdy-script-framework.html Research, News, and Perspective urn:uuid:5265919b-48a6-cabb-22d6-2dfda1459765 Mon, 26 Jan 2026 00:00:00 +0000 PeckBirdy is a sophisticated JScript-based C&C framework used by China-aligned APT groups to exploit LOLBins across multiple environments, delivering advanced backdoors to target gambling industries and Asian government entities. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Articles, News, Reports Trend Micro Research : Research Ted Lee Embracing Choice in Cybersecurity: TrendAI Vision One™ and SentinelOne Integration https://www.trendmicro.com/en_us/research/26/a/embracing-choice-in-cybersecurity.html Research, News, and Perspective urn:uuid:19f1c700-cf5b-ffbd-7bb6-ff5b2c17ee3e Mon, 26 Jan 2026 00:00:00 +0000 Discover how the TrendAI Vision One and SentinelOne integration exemplifies our commitment to endpoint flexibility. Trend Micro Research : Cloud Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Cyber Threats Trend Micro Research : Compliance & Risks Trend Micro Research : Endpoints Trend Micro Research : Network Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports Jenny Hua Pwn2Own: Researchers Earn $1 Million for 76 Zero-Days https://www.trendmicro.com/en_us/research/26/a/pwn2own-researchers-earn-1-million-for-76-zero-days.html Research, News, and Perspective urn:uuid:8c265779-825d-3330-61c0-2f0a444cae15 Mon, 26 Jan 2026 00:00:00 +0000 Discover how TrendAI Zero Day Initiative (ZDI) identified critical vulnerabilities across connected vehicles, EV chargers, and automotive systems. Trend Micro Research : Latest News Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Trend Micro Research : Connected Car Trend Micro Research Watering Hole Attack Targets EmEditor Users with Information-Stealing Malware https://www.trendmicro.com/en_us/research/26/a/watering-hole-attack-targets-emeditor-users.html Research, News, and Perspective urn:uuid:a6da7eaa-2589-b04f-79b9-e465a0e571b0 Thu, 22 Jan 2026 00:00:00 +0000 TrendAI™ Research provides a technical analysis of a compromised EmEditor installer used to deliver multistage malware that performs a range of malicious actions. Trend Micro Research : Research Trend Micro Research : Cyber Risk Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Don Ovid Ladores From Extension to Infection: An In-Depth Analysis of the Evelyn Stealer Campaign Targeting Software Developers https://www.trendmicro.com/en_us/research/26/a/analysis-of-the-evelyn-stealer-campaign.html Research, News, and Perspective urn:uuid:c77b422b-be37-352e-b09a-e30c1b66d1ae Mon, 19 Jan 2026 00:00:00 +0000 This blog entry provides an in-depth analysis of the multistage delivery of the Evelyn information stealer, which was used in a campaign targeting software developers. Trend Micro Research : Malware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Ahmed Mohamed Ibrahim Your 100 Billion Parameter Behemoth is a Liability https://www.trendmicro.com/en_us/research/26/a/your-100-billion-parameter-behemoth-is-a-liability.html Research, News, and Perspective urn:uuid:bdb58958-1d59-3c68-7a9c-74640dfd8204 Fri, 16 Jan 2026 00:00:00 +0000 The "bigger is better" era of AI is hitting a wall. We are in an LLM bubble, characterized by ruinous inference costs and diminishing returns. The future belongs to Agentic AI powered by specialized Small Language Models (SLMs). Think of it as a shift from hiring a single expensive genius to running a highly efficient digital factory. It’s cheaper, faster, and frankly, the only way to make agents work at scale. Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Data center Fernando Tucci Introducing ÆSIR: Finding Zero-Day Vulnerabilities at the Speed of AI https://www.trendmicro.com/en_us/research/26/a/aesir.html Research, News, and Perspective urn:uuid:610b0598-74d4-e994-ab77-4bfc411651e5 Thu, 15 Jan 2026 00:00:00 +0000 TrendAI™’s ÆSIR platform combines AI automation with expert oversight to discover zero-day vulnerabilities in AI infrastructure – 21 CVEs across NVIDIA, Tencent, and MLflow since mid-2025. Trend Micro Research : Latest News Trend Micro Research : Articles, News, Reports Peter Girnus Key Insights on SHADOW-AETHER-015 and Earth Preta from the 2025 MITRE ATT&CK Evaluation with TrendAI Vision One™ https://www.trendmicro.com/en_us/research/26/a/shadow-aether-015-earth-preta-mitre.html Research, News, and Perspective urn:uuid:e989da45-5d8e-3c50-de58-2180649db40d Tue, 13 Jan 2026 00:00:00 +0000 This blog discusses notable modern TTPs observed from SHADOW-AETHER-015 and Earth Preta, from TrendAI Research™ monitoring and TrendAI Vision One™ intelligence. These findings support the performance of TrendAI™ in the 2025 MITRE ATT&CK Evaluations. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Analyzing a Multi-Stage AsyncRAT Campaign via Managed Detection and Response https://www.trendmicro.com/en_us/research/26/a/analyzing-a-a-multi-stage-asyncrat-campaign-via-mdr.html Research, News, and Perspective urn:uuid:98864a5c-15b1-5f41-793a-699ae3f530cf Mon, 12 Jan 2026 00:00:00 +0000 Threat actors exploited Cloudflare's free-tier infrastructure and legitimate Python environments to deploy the AsyncRAT remote access trojan, demonstrating advanced evasion techniques that abuse trusted cloud services for malicious operations. Trend Micro Research : Malware Trend Micro Research : Research Trend Micro Research : Phishing Trend Micro Research : Articles, News, Reports Buddy Tancio Get Executives on board with managing Cyber Risk https://www.trendmicro.com/en_us/research/25/l/managing-cyber-risk-with-executives.html Research, News, and Perspective urn:uuid:950b3327-4476-8f3d-87cb-45a1e290cf1e Mon, 29 Dec 2025 00:00:00 +0000 Learn how the 2025 Trend Micro Defenders Survey Report helps paint a clear picture of how security teams are looking to work with executive leaders to manage cyber risk. Trend Micro Research : Compliance & Risks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Annual Predictions Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Trend Micro's Pivotal Role in INTERPOL's Operation Sentinel: Dismantling Digital Extortion Networks Across Africa https://www.trendmicro.com/en_us/research/25/l/operation-sentinel-digital-extortion-campaigns-identified.html Research, News, and Perspective urn:uuid:2a2f419d-e176-2a5c-1c24-d92f2bc9fc32 Mon, 29 Dec 2025 00:00:00 +0000 Continuing a Legacy of Successful Collaboration Trend Micro Research : Cloud Trend Micro Research : Cyber Crime Trend Micro Research : Expert Perspective Trend Micro Research : Articles, News, Reports What Does it Take to Manage Cloud Risk? https://www.trendmicro.com/en_us/research/25/l/managing-cloud-risk.html Research, News, and Perspective urn:uuid:e2d82863-e8d2-615c-48a3-f3218e9e1c0b Mon, 22 Dec 2025 00:00:00 +0000 Learn why hybrid and multi-cloud environments are vital for IT and business success from our 2025 Trend Micro Defenders Survey. Trend Micro Research : Cloud Trend Micro Research : Compliance & Risks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Annual Predictions Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats What Cyber Defenders Really Think About AI Risk https://www.trendmicro.com/en_us/research/25/l/cyber-defenders-and-ai-risks.html Research, News, and Perspective urn:uuid:a3f21819-3e60-6587-e548-c3a7ed7ac4f4 Thu, 18 Dec 2025 00:00:00 +0000 Learn how Trend Micro's 2025 Trend Micro Defenders Survey Report highlights current AI-related cybersecurity priorities and where security professionals use AI to their advantage. Trend Micro Research : Compliance & Risks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Annual Predictions Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Cyber Risk Management: Defenders Tell It Like It Is https://www.trendmicro.com/en_us/research/25/l/trend-micros-2025-defenders-survey-report.html Research, News, and Perspective urn:uuid:bb1885a8-decd-0473-1e31-0be307325b21 Mon, 15 Dec 2025 00:00:00 +0000 Based on more than 3,000 responses from cybersecurity professionals in nearly 90 countries, our Trend Micro Defenders Survey Report 2025 shines a bright light on the current state of cyber risk management. From the impact of cloud and AI on IT environments to top technical and human challenges, this year’s findings have a lot to say about the pressures security teams are under and what organizations are doing to tighten their grip on cyber risk. Trend Micro Research : Compliance & Risks Trend Micro Research : Report Trend Micro Research : Annual Predictions Enhancing Security Awareness with Cyber Risk Exposure Management https://www.trendmicro.com/en_us/research/25/l/optimize-security-management-in-cyber-risk-exposure-management.html Research, News, and Perspective urn:uuid:87e053b4-76eb-4603-5198-36c512939171 Mon, 15 Dec 2025 00:00:00 +0000 Learn how to strategically tackle human risk for smarter prioritization and lasting behavioral change. Trend Micro Research : Phishing Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Sanjana Sadh SHADOW-VOID-042 Targets Multiple Industries with Void Rabisu-like Tactics https://www.trendmicro.com/en_us/research/25/l/SHADOW-VOID-042.html Research, News, and Perspective urn:uuid:aa9af7e3-cfd7-1ff1-64c0-d3a0cde68434 Thu, 11 Dec 2025 00:00:00 +0000 In November, a targeted spear-phishing campaign was observed using Trend Micro-themed lures against various industries, but this was quickly detected and thwarted by the Trend Vision One™ platform. Trend Micro Research : Latest News Trend Micro Research : Research Trend Micro Research : Phishing Trend Micro Research : Articles, News, Reports Daniel Lunghi Trend Vision One™ Integration with AWS Security Hub CSPM: Unifying Cloud Security https://www.trendmicro.com/en_us/research/25/l/aws-security-hub-integration.html Research, News, and Perspective urn:uuid:7d63291d-f40f-4726-c6ab-0f5ce42e301d Wed, 10 Dec 2025 00:00:00 +0000 The integration between Trend Vision One and Security Hub CSPM is exactly that, two powerful platforms enhancing each other to keep your AWS infrastructure protected. Trend Micro Research : Cloud Trend Micro Research : How To Trend Micro Research : Malware Trend Micro Research : Phishing Trend Micro Research : Compliance & Risks Trend Micro Research : Ransomware Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Deep Web Trend Micro Research : Privacy & Risks Trend Micro Research : Cyber Threats Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Spam Eduardo Castro Trend Vision One™ Stacks Up Against Scattered Spider and Mustang Panda in 2025 MITRE ATT&CK® Evaluations https://www.trendmicro.com/en_us/research/25/l/cloud-automation-2025-mitre-attack-round-7.html Research, News, and Perspective urn:uuid:be28d7f8-6fae-a25f-6383-7a2f673f61f6 Wed, 10 Dec 2025 00:00:00 +0000 Enterprise 2025 introduces the first full cloud adversary emulation and expanded multi-platform testing, focusing on two advanced threat areas: Scattered Spider’s cloud-centric attacks and Mustang Panda’s long-term espionage operations. Trend Micro Research : Cloud Trend Micro Research : Latest News Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Privacy & Risks Trend Micro Research : Endpoints Trend Micro Research : IoT Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Articles, News, Reports CVE-2025-55182: React2Shell Analysis, Proof-of-Concept Chaos, and In-the-Wild Exploitation https://www.trendmicro.com/en_us/research/25/l/CVE-2025-55182-analysis-poc-itw.html Research, News, and Perspective urn:uuid:c96b74f4-45d2-b27c-4fc2-70d60688ee2a Wed, 10 Dec 2025 00:00:00 +0000 CVE-2025-55182 is a CVSS 10.0 pre-authentication RCE affecting React Server Components. Amid the flood of fake proof-of-concept exploits, scanners, exploits, and widespread misconceptions, this technical analysis intends to cut through the noise. Trend Micro Research : Latest News Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Peter Girnus AI-Automated Threat Hunting Brings GhostPenguin Out of the Shadows https://www.trendmicro.com/en_us/research/25/l/ghostpenguin.html Research, News, and Perspective urn:uuid:5886d7f9-4d21-6eef-6093-8c0699ec2eb3 Mon, 08 Dec 2025 00:00:00 +0000 In this blog entry, Trend™ Research provides a comprehensive breakdown of GhostPenguin, a previously undocumented Linux backdoor with low detection rates that was discovered through AI-powered threat hunting and in-depth malware analysis. Trend Micro Research : Latest News Trend Micro Research : Articles, News, Reports Trend Micro Research : Research Aliakbar Zahravi Critical React Server Components Vulnerability CVE-2025-55182: What Security Teams Need to Know https://www.trendmicro.com/en_us/research/25/l/critical-react-server-components-vulnerability.html Research, News, and Perspective urn:uuid:b1facb91-7069-e8ec-f5cc-50bc1045b886 Fri, 05 Dec 2025 00:00:00 +0000 CVE-2025-55182 is a critical (CVSS 10.0) pre-authentication remote code execution vulnerability affecting React Server Components used in React.js, Next.js, and related frameworks (see the context section for a more exhaustive list of affected frameworks). Trend Micro Research : Articles, News, Reports Trend Micro Research : Research Trend Micro Research : Exploits & Vulnerabilities Peter Girnus Project View: A New Era of Prioritized and Actionable Cloud Security https://www.trendmicro.com/en_us/research/25/k/cloud-risk-management.html Research, News, and Perspective urn:uuid:052a89b1-53de-a33a-e1a3-f9249b1db3ae Thu, 04 Dec 2025 00:00:00 +0000 In today's cloud-first world, security teams face an overwhelming flood of alerts, fragmented visibility, and reactive workflows. The complexity of modern cloud environments—spanning multi-cloud deployments, ephemeral assets, and decentralized ownership—demands a new approach to risk management. Trend Micro Research : Cloud Trend Micro Research : Compliance & Risks Trend Micro Research : How To Trend Micro Research : Articles, News, Reports Truman Coburn PureRAT Campaign Targets Job Seekers, Abuses Foxit PDF Reader for DLL Side-loading https://www.trendmicro.com/en_us/research/25/l/valleyrat-campaign.html Research, News, and Perspective urn:uuid:8d9b1bb7-b8ce-96ea-6bc8-dd567f7b1e2d Wed, 03 Dec 2025 00:00:00 +0000 Job seekers looking out for opportunities might instead find their personal devices compromised, as a PureRAT campaign propagated through email leverages Foxit PDF Reader for concealment and DLL side-loading for initial entry. Trend Micro Research : Latest News Trend Micro Research : Malware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Sarah Pearl Camiling Unraveling Water Saci's New Multi-Format, AI-Enhanced Attacks Propagated via WhatsApp https://www.trendmicro.com/en_us/research/25/l/water-saci.html Research, News, and Perspective urn:uuid:02e593c3-80d7-c25c-69ae-d408b529fdbb Tue, 02 Dec 2025 00:00:00 +0000 Through AI-driven code conversion and a layered infection chain involving different file formats and scripting languages, the threat actors behind Water Saci are quickly upgrading their malware delivery and propagation methods across WhatsApp in Brazil. Trend Micro Research : Articles, News, Reports Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Research Jeffrey Francis Bonaobra What’s your CNAPP maturity? https://www.trendmicro.com/en_us/research/25/l/whats-your-cnapp-maturity.html Research, News, and Perspective urn:uuid:d972522a-1e70-0aba-99e5-19befbb6437a Mon, 01 Dec 2025 00:00:00 +0000 More and more enterprises are opting for cloud-native application protection platforms (CNAPPs) instead of complex and hard-to-manage cloud security point solutions. Find out where your organization is on its CNAPP maturity journey. Trend Micro Research : Cloud Trend Micro Research : Malware Trend Micro Research : Phishing Trend Micro Research : Compliance & Risks Trend Micro Research : Ransomware Trend Micro Research : Articles, News, Reports Trend Micro Research : Consumer Focus Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Deep Web Trend Micro Research : Privacy & Risks Trend Micro Research : Cyber Threats Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Spam Elevate Your Cloud Security Strategy https://www.trendmicro.com/en_us/research/25/l/cloud-security-strategy.html Research, News, and Perspective urn:uuid:6a4299c0-62a9-792a-ef7c-ea5cd2f3a815 Mon, 01 Dec 2025 00:00:00 +0000 Learn to elevate your cloud security strategy & overcome complexity with Vision One™. Trend Micro Research : Cloud Trend Micro Research : Malware Trend Micro Research : Phishing Trend Micro Research : Compliance & Risks Trend Micro Research : Ransomware Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Deep Web Trend Micro Research : Privacy & Risks Trend Micro Research : Cyber Threats Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Spam Eduardo Castro Shai-hulud 2.0 Campaign Targets Cloud and Developer Ecosystems https://www.trendmicro.com/en_us/research/25/k/shai-hulud-2-0-targets-cloud-and-developer-systems.html Research, News, and Perspective urn:uuid:953d818d-f87a-a7dd-6704-cd735697f7ec Thu, 27 Nov 2025 00:00:00 +0000 Shai-hulud 2.0 campaign features a sophisticated variant capable of stealing credentials and secrets from major cloud platforms and developer services, while automating the backdooring of NPM packages maintained by victims. Its advanced tactics enable rapid, stealthy propagation across the software supply chain, putting countless downstream users at risk. Trend Micro Research : Latest News Trend Micro Research : Malware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Jeffrey Francis Bonaobra Trend & AWS Partner on Cloud IPS: One-Click Protection https://www.trendmicro.com/en_us/research/25/k/cloud-ips-one-click-protection.html Research, News, and Perspective urn:uuid:79dac140-fee7-ac56-7d81-6fb04d736b49 Thu, 20 Nov 2025 00:00:00 +0000 In the race to secure cloud infrastructure, intrusion prevention systems (IPS) remain one of the most critical yet complex at the cloud network layer of defense. For many organizations, deploying IPS in the cloud is a balancing act between agility and control. Trend Micro Research : Cloud Trend Micro Research : Latest News Trend Micro Research : Malware Trend Micro Research : Phishing Trend Micro Research : Compliance & Risks Trend Micro Research : Ransomware Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Deep Web Trend Micro Research : Privacy & Risks Trend Micro Research : Cyber Threats Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Spam Trend Micro Research : Network Bestin Koruthu Breaking Down S3 Ransomware: Variants, Attack Paths and Trend Vision One™ Defenses https://www.trendmicro.com/en_us/research/25/k/s3-ransomware.html Research, News, and Perspective urn:uuid:efbdfab9-b46d-6627-d858-292c85d0932d Tue, 18 Nov 2025 00:00:00 +0000 In this blog entry, Trend™ Research explores how ransomware actors are shifting their focus to cloud-based assets, including the tactics used to compromise business-critical data in AWS environments. Trend Micro Research : Articles, News, Reports Trend Micro Research : Ransomware Trend Micro Research : Research Yash Verma Redefining Enterprise Defense in the Era of AI-Led Cyberattacks https://www.trendmicro.com/en_us/research/25/k/redefining-defense-in-era-of-ai-led-attacks.html Research, News, and Perspective urn:uuid:ae2332cf-056a-2458-674e-70550198a3a1 Fri, 14 Nov 2025 00:00:00 +0000 More cybercriminals are turning to using autonomous AI tools to upgrade their attacks, as exemplified by the recent utilization of Anthropic’s Claude Code, prompting an urgent need for enterprises to adopt agentic AI-driven security platforms and proactive defenses to counter AI-related threats. Trend Micro Research : Latest News Trend Micro Research : Research Trend Micro Research : Cyber Risk Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Increase in Lumma Stealer Activity Coincides with Use of Adaptive Browser Fingerprinting Tactics https://www.trendmicro.com/en_us/research/25/k/lumma-stealer-browser-fingerprinting.html Research, News, and Perspective urn:uuid:554cda18-51c9-e64e-af73-d4bfe3bd06ad Thu, 13 Nov 2025 00:00:00 +0000 In this blog entry, Trend™ Research analyses the layered command-and-control approaches that Lumma Stealer uses to maintain its ongoing operations while enhancing collection of victim-environment data. Trend Micro Research : Malware Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Junestherry Dela Cruz IBM Infrastructure: Continuous Risk & Compliance https://www.trendmicro.com/en_us/research/25/k/ibm-infrastructure-continuous-risk-compliance.html Research, News, and Perspective urn:uuid:9f54b036-67f2-4740-ca63-9d47b7b29bfa Wed, 12 Nov 2025 00:00:00 +0000 Learn all about AI-powered visibility, telemetry, and proactive security across mainframe, cloud, containers, and enterprise workloads. Trend Micro Research : Cloud Trend Micro Research : Latest News Trend Micro Research : Endpoints Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Trend Micro Research : Data center From Data Loss Prevention (DLP) to Modern Data Security https://www.trendmicro.com/en_us/research/25/k/dlp-to-modern-data-security.html Research, News, and Perspective urn:uuid:c802434c-92fe-9995-8b0a-041291cfc2c0 Wed, 12 Nov 2025 00:00:00 +0000 It’s time to rethink your approach Trend Micro Research : Cloud Trend Micro Research : Consumer Focus Trend Micro Research : Cyber Crime Trend Micro Research : Privacy & Risks Trend Micro Research : Cyber Threats Trend Micro Research : Data center Trend Micro Research : Compliance & Risks Trend Micro Research : Endpoints Trend Micro Research : Articles, News, Reports How are you managing cloud risk? https://www.trendmicro.com/en_us/research/25/j/manage-cloud-risk.html Research, News, and Perspective urn:uuid:762307ae-5385-4086-4c5a-33680f14fe6f Fri, 31 Oct 2025 00:00:00 +0000 Learn why managing cloud risk demands unified visibility, continuous risk assessment, and efficient security operations. Discover how a full-featured CNAPP like Trend Vision One™ Cloud Security enables organizations to move from reactive to proactive cloud protection. Trend Micro Research : Cloud Trend Micro Research : Malware Trend Micro Research : Phishing Trend Micro Research : Compliance & Risks Trend Micro Research : Ransomware Trend Micro Research : Cyber Risk Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Crime Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Deep Web Trend Micro Research : Privacy & Risks Trend Micro Research : Cyber Threats Trend Micro Research : Risk Management Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Spam Bestin Koruthu AI Security: NVIDIA BlueField Now with Vision One™ https://www.trendmicro.com/en_us/research/25/j/ai-security-nvidia-bluefield.html Research, News, and Perspective urn:uuid:dffaf819-8014-9bbc-ce93-0c870a763c92 Tue, 28 Oct 2025 00:00:00 +0000 Launching at NVIDIA GTC 2025 - Transforming AI Security with Trend Vision One™ on NVIDIA BlueField Trend Micro Research : Cloud Trend Micro Research : Latest News Trend Micro Research : Web Trend Micro Research : Connected Car Trend Micro Research : Endpoints Trend Micro Research : Articles, News, Reports Trend Micro Research : Social Media Trend Micro Research : Smart Home Trend Micro Research : Data center Trend Micro Research : ICS OT Trend Micro Research : IoT Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Mobile Trend Micro Research : Network Fernando Cardoso Active Water Saci Campaign Spreading Via WhatsApp Features Multi-Vector Persistence and Sophisticated C&C https://www.trendmicro.com/en_us/research/25/j/active-water-saci-campaign-whatsapp-update.html Research, News, and Perspective urn:uuid:ed81c990-c5c6-0bf5-438a-185ad6ea7789 Mon, 27 Oct 2025 00:00:00 +0000 Continuous investigation on the Water Saci campaign reveals innovative email-based C&C system, multi-vector persistence, and real-time command capabilities that allow attackers to orchestrate coordinated botnet operations, gather detailed campaign intelligence, and dynamically control malware activity across multiple infected machines. Trend Micro Research : Latest News Trend Micro Research : Malware Trend Micro Research : Research Trend Micro Research : Phishing Trend Micro Research : Articles, News, Reports Jeffrey Francis Bonaobra Agenda Ransomware Deploys Linux Variant on Windows Systems Through Remote Management Tools and BYOVD Techniques https://www.trendmicro.com/en_us/research/25/j/agenda-ransomware-deploys-linux-variant-on-windows-systems.html Research, News, and Perspective urn:uuid:8fd84c77-fa74-eb3f-83a4-a186e5190685 Thu, 23 Oct 2025 00:00:00 +0000 Trend™ Research identified a sophisticated Agenda ransomware attack that deployed a Linux variant on Windows systems. This cross-platform execution can make detection challenging for enterprises. Trend Micro Research : Latest News Trend Micro Research : Ransomware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Jacob Santos Trend Micro Recognized as a Leader in The Forrester Wave™ 2025 for NAV https://www.trendmicro.com/en_us/research/25/j/forrester-wave-nav-2025.html Research, News, and Perspective urn:uuid:76863079-29bf-ecd7-f91d-7edf9de98d92 Wed, 22 Oct 2025 00:00:00 +0000 Unified visibility, proactive intelligence, and proven leadership in network analysis and visibility. Trend Micro Research : Latest News Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Network Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Jamal Bethea The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns https://www.trendmicro.com/en_us/research/25/j/premier-pass-as-a-service.html Research, News, and Perspective urn:uuid:6a6a78de-edf3-9b32-edf1-1e496ea9b841 Wed, 22 Oct 2025 00:00:00 +0000 Trend™ Research examines the complex collaborative relationship between China-aligned APT groups via the new “Premier Pass-as-a-Service” model, exemplified by the recent activities of Earth Estries and Earth Naga. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Cyber Threats Trend Micro Research : Research Daniel Lunghi Fast, Broad, and Elusive: How Vidar Stealer 2.0 Upgrades Infostealer Capabilities https://www.trendmicro.com/en_us/research/25/j/how-vidar-stealer-2-upgrades-infostealer-capabilities.html Research, News, and Perspective urn:uuid:8b156f43-a024-ff0c-a184-2e578a8683eb Tue, 21 Oct 2025 00:00:00 +0000 Trend Research examines the latest version of the Vidar stealer, which features a full rewrite in C, a multithreaded architecture, and several enhancements that warrant attention. Its timely evolution suggests that Vidar is positioning itself to occupy the space left after Lumma Stealer’s decline. Trend Micro Research : Malware Trend Micro Research : Articles, News, Reports Trend Micro Research : Research Junestherry Dela Cruz How Trend Micro Empowers the SOC with Agentic SIEM https://www.trendmicro.com/en_us/research/25/j/soc-agentic-siem.html Research, News, and Perspective urn:uuid:3d1d9377-b99a-15fa-05b3-00bc5f930a3a Tue, 21 Oct 2025 00:00:00 +0000 By delivering both XDR leadership and Agentic SIEM innovation under one platform, Trend is redefining what security operations can be. Trend Micro Research : Consumer Focus Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Joyce Huang Shifts in the Underground: The Impact of Water Kurita’s (Lumma Stealer) Doxxing https://www.trendmicro.com/en_us/research/25/j/the-impact-of-water-kurita-lumma-stealer-doxxing.html Research, News, and Perspective urn:uuid:1adbb834-8136-ff5c-e29c-8763a0f69a9c Thu, 16 Oct 2025 00:00:00 +0000 A targeted underground doxxing campaign exposed alleged core members of Lumma Stealer (Water Kurita), resulting in a sharp decline in its activity and a migration of customers to rival infostealer platforms. Trend Micro Research : Malware Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Junestherry Dela Cruz Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits https://www.trendmicro.com/en_us/research/25/j/operation-zero-disco-cisco-snmp-vulnerability-exploit.html Research, News, and Perspective urn:uuid:dacf0061-0a29-8653-de40-0336f0691441 Wed, 15 Oct 2025 00:00:00 +0000 Trend™ Research has uncovered an attack campaign exploiting the Cisco SNMP vulnerability CVE-2025-20352, allowing remote code execution and rootkit deployment on unprotected devices, with impacts observed on Cisco 9400, 9300, and legacy 3750G series. Trend Micro Research : Latest News Trend Micro Research : Research Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Dove Chiu Trend Micro launches new integration with Zscaler to deliver real-time, Risk-Based Zero Trust Access https://www.trendmicro.com/en_us/research/25/j/real-time-risk-based-zero-trust.html Research, News, and Perspective urn:uuid:e3ee472d-3967-0673-20bd-b736869fa528 Tue, 14 Oct 2025 00:00:00 +0000 Discover how Trend Vision One™ integrates with Zscaler to unify detection and access enforcement, accelerate threat containment, reduce dwell time, and deliver seamless Zero Trust protection for modern enterprises. Trend Micro Research : Cloud Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Cyber Threats Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Endpoints Trend Micro Research : Network Trend Micro Research : Security Strategies Trend Micro Research : Articles, News, Reports Jenny Hua Weaponized AI Assistants & Credential Thieves https://www.trendmicro.com/en_us/research/25/j/weaponized-ai-assistants.html Research, News, and Perspective urn:uuid:898d26cb-1f32-9b71-e753-93399c26c4fa Thu, 09 Oct 2025 00:00:00 +0000 Learn the state of AI and the NPM ecosystem with the recent s1ngularity' weaponized AI for credential theft. Trend Micro Research : APT & Targeted Attacks Trend Micro Research : Articles, News, Reports Trend Micro Research : Research Fernando Tucci RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits https://www.trendmicro.com/en_us/research/25/j/rondodox.html Research, News, and Perspective urn:uuid:11e41e25-0dcd-49c9-b5e4-02a1b4ccbd36 Thu, 09 Oct 2025 00:00:00 +0000 Trend™ Research and ZDI Threat Hunters have identified a large-scale RondoDox botnet campaign exploiting over 50 vulnerabilities across more than 30 vendors, including flaws first seen in Pwn2Own contests. Trend Micro Research : Latest News Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Trend Micro Research : Cyber Threats Deep Patel How Your AI Chatbot Can Become a Backdoor https://www.trendmicro.com/en_us/research/25/j/ai-chatbot-backdoor.html Research, News, and Perspective urn:uuid:97454f67-8171-b22c-1988-f62cc7305278 Wed, 08 Oct 2025 00:00:00 +0000 In this post of THE AI BREACH, learn how your Chatbot can become a backdoor. Trend Micro Research : Artificial Intelligence (AI) Trend Micro Research : Exploits & Vulnerabilities Trend Micro Research : Research Trend Micro Research : Articles, News, Reports Kim Kinahan A Cascade of Insecure Architectures: Axis Plugin Design Flaw Expose Select Autodesk Revit Users to Supply Chain Risk https://www.trendmicro.com/en_us/research/25/j/axis-plugin-flaw-autodesk-revit-supply-chain-risk.html Research, News, and Perspective urn:uuid:a98a4d60-69fa-35c3-8716-3039416f0ec5 Wed, 08 Oct 2025 00:00:00 +0000 We discovered Azure Storage Account credentials exposed in Axis Communications’ Autodesk Revit plugin, allowing unauthorized modification of cloud-hosted files. This exposure, combined with vulnerabilities in Autodesk Revit, could enable supply-chain attacks targeting end users. Trend Micro Research : Cloud Trend Micro Research : Articles, News, Reports Trend Micro Research : Exploits & Vulnerabilities Nitesh Surana Self-Propagating Malware Spreading Via WhatsApp, Targets Brazilian Users https://www.trendmicro.com/en_us/research/25/j/self-propagating-malware-spreads-via-whatsapp.html Research, News, and Perspective urn:uuid:3baf09c7-2e15-041c-9607-fcfdf4d68ada Fri, 03 Oct 2025 00:00:00 +0000 Trend™ Research has identified an active campaign spreading via WhatsApp through a ZIP file attachment. When executed, the malware establishes persistence and hijacks the compromised WhatsApp account to send copies of itself to the victim’s contacts. Trend Micro Research : Latest News Trend Micro Research : Malware Trend Micro Research : Research Trend Micro Research : Phishing Jeffrey Francis Bonaobra