Trend Micro Research, News and Perspectives
http://feed.informer.com/digests/G5HRN3DTV4/feeder
Respective post owners and feed distributorsTue, 09 Nov 2021 16:45:03 +0000Feed Informer http://feed.informer.com/What We Know About CVE-2024-49112 and CVE-2024-49113
https://www.trendmicro.com/en_us/research/25/a/what-we-know-about-cve-2024-49112-and-cve-2024-49113.html
urn:uuid:d3aced8c-edfa-9336-8be8-82fbdc827506Sat, 04 Jan 2025 00:00:00 +0000This blog entry provides an overview of CVE-2024-49112 and CVE-2024-49113 and includes information that IT and SOC professionals need to know to stay protected against possible exploitation.Trend Micro Research : ResearchTrend Micro Research : Exploits & VulnerabilitiesAI Pulse: Top AI Trends from 2024 - A Look Back
https://www.trendmicro.com/en_us/research/25/a/top-ai-trends-from-2024-review.html
urn:uuid:ecf1f82c-bd5d-3e85-b7eb-7cd6f3f82060Fri, 03 Jan 2025 00:00:00 +0000In this edition of AI Pulse, let's look back at top AI trends from 2024 in the rear view so we can more clearly predicts AI trends for 2025 and beyond.Trend Micro Research : Social MediaTrend Micro Research : Expert PerspectiveTrend Micro Research : Cyber ThreatsTrend Micro Research : Compliance & RisksTrend Micro Research : EndpointsTrend Micro Research : Artificial Intelligence (AI)Trend Micro Research : NetworkTrend Micro Research : Articles, News, ReportsAI TeamPython-Based NodeStealer Version Targets Facebook Ads Manager
https://www.trendmicro.com/en_us/research/24/l/python-based-nodestealer.html
urn:uuid:6d380b53-30d1-17da-2558-a878f0b619e3Thu, 19 Dec 2024 00:00:00 +0000In this blog entry, Trend Micro’s Managed XDR team discuss their investigation into how the latest variant of NodeStealer is delivered through spear-phishing attacks, potentially leading to malware execution, data theft, and the exfiltration of sensitive information via Telegram.Trend Micro Research : MalwareTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsAira MarceloFedRAMP ATO Boosts Zero Trust for Federal Agencies
https://www.trendmicro.com/en_us/research/24/l/fedramp-ato-zero-trust.html
urn:uuid:0a91ae2c-f775-65ca-bdf9-8ed581fc7b84Thu, 19 Dec 2024 00:00:00 +0000Trend Vision One™ for Government has obtained a FedRAMP Authorization to Operate (ATO). This milestone enables Federal government customers to leverage Trend’s platform to rapidly stop adversaries and control their cybersecurity risk posture.Trend Micro Research : CloudTrend Micro Research : Latest NewsTrend Micro Research : Compliance & RisksTrend Micro Research : EndpointsTrend Micro Research : NetworkLink Trap: GenAI Prompt Injection Attack
https://www.trendmicro.com/en_us/research/24/l/genai-prompt-injection-attack-threat.html
urn:uuid:ddace753-405c-ade3-7a00-13a35cdf9f5eTue, 17 Dec 2024 00:00:00 +0000 Prompt injection exploits vulnerabilities in generative AI to manipulate its behavior, even without extensive permissions. This attack can expose sensitive data, making awareness and preventive measures essential. Learn how it works and how to stay protected.Trend Micro Research : Exploits & VulnerabilitiesTrend Micro Research : Cyber ThreatsTrend Micro Research : Data centerTrend Micro Research : EndpointsTrend Micro Research : Artificial Intelligence (AI)Trend Micro Research : NetworkTrend Micro Research : Security StrategiesTrend Micro Research : Articles, News, ReportsJay LiaoVishing via Microsoft Teams Facilitates DarkGate Malware Intrusion
https://www.trendmicro.com/en_us/research/24/l/darkgate-malware.html
urn:uuid:bbca78ca-12a5-1156-d3e7-9cc32d5d4818Fri, 13 Dec 2024 00:00:00 +0000In this blog entry, we discuss a social engineering attack that tricked the victim into installing a remote access tool, triggering DarkGate malware activities and an attempted C&C connection.Trend Micro Research : Latest NewsTrend Micro Research : Cyber ThreatsTrend Micro Research : ResearchCatherine LoveriaINTERPOL & Trend's Fight Against Cybercrime
https://www.trendmicro.com/en_us/research/24/l/interpol-cybercrime.html
urn:uuid:103c9f0c-36c3-971d-ab6a-c46a57742f9cThu, 12 Dec 2024 00:00:00 +0000Trend threat intelligence and training were crucial to the success of two major policing operations in 2024Trend Micro Research : CloudTrend Micro Research : Latest NewsTrend Micro Research : Cyber CrimeTrend Micro Research : Cyber ThreatsTrend Micro Research : InfographicJon ClayMITRE ATT&CK 2024 Results for Enterprise Security
https://www.trendmicro.com/en_us/research/24/l/mitre-attack-results-enterprise-security-2024.html
urn:uuid:56007f7f-715e-eca5-15e2-ca757303c6e9Mon, 09 Dec 2024 00:00:00 +0000Enterprise 2024 will incorporate multiple, smaller emulations for a more nuanced and targeted evaluation of defensive capabilities. We’re excited to offer two distinct adversary focus areas: Ransomware targeting Windows and Linux, and the Democratic People's Republic of Korea's targeting macOS.Trend Micro Research : CloudTrend Micro Research : Exploits & VulnerabilitiesTrend Micro Research : ReportsTrend Micro Research : APT & Targeted AttacksTrend Micro Research : EndpointsTrend Micro Research : RansomwareTrend Micro Research : NetworkTrend Micro Research : Articles, News, ReportsMike GrodzkiMOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks
https://www.trendmicro.com/en_us/research/24/l/earth-minotaur.html
urn:uuid:48059e43-12ed-69ea-594f-709baf195d26Thu, 05 Dec 2024 00:00:00 +0000Trend Micro’s monitoring of the MOONSHINE exploit kit revealed how it’s used by the threat actor Earth Minotaur to exploit Android messaging app vulnerabilities and install the DarkNimbus backdoor for surveillance. Trend Micro Research : APT & Targeted AttacksTrend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsJoseph C ChenThe Road to Agentic AI: Exposed Foundations
https://www.trendmicro.com/en_us/research/24/k/agentic-ai.html
urn:uuid:8c2b6a12-3acb-f67d-f3c5-193a1942952cWed, 04 Dec 2024 00:00:00 +0000Our research into Retrieval Augmented Generation (RAG) systems uncovered at least 80 unprotected servers. We highlight this problem, which can lead to potential data loss and unauthorized access.Trend Micro Research : CloudTrend Micro Research : Artificial Intelligence (AI)Trend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsMorton SwimmerGafgyt Malware Broadens Its Scope in Recent Attacks
https://www.trendmicro.com/en_us/research/24/l/gafgyt-malware-targeting-docker-remote-api-servers.html
urn:uuid:1cb1cca2-4b3e-e17b-8e55-89568f33f1c5Tue, 03 Dec 2024 00:00:00 +0000Our researchers identified threat actors exploiting misconfigured Docker servers to spread the Gafgyt malware. This threat traditionally targets IoT devices; this new tactic signals a change in its behavior.Trend Micro Research : CloudTrend Micro Research : MalwareTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsSunil BhartiWorld Tour Survey: IT Operations’ Hands-on Defense
https://www.trendmicro.com/en_us/research/24/l/world-tour-cybersecurity-survey-it-defense.html
urn:uuid:c6ecebc0-0a0c-b45a-cbf0-cf2ed69fa6b0Mon, 02 Dec 2024 00:00:00 +0000Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what IT operations teams had to say.Trend Micro Research : Cyber CrimeTrend Micro Research : WebTrend Micro Research : ResearchTrend Micro Research : Cyber ThreatsTrend Micro Research : Compliance & RisksTrend Micro Research : EndpointsTrend Micro Research : NetworkTrend Micro Research : Articles, News, ReportsAI Configuration Best Practices to address AI Security Risks
https://www.trendmicro.com/en_us/research/24/k/ai-configuration-best-practices.html
urn:uuid:bdf9bbba-2335-5903-5eea-8acfdd099314Mon, 02 Dec 2024 00:00:00 +0000AI usage is on the rise as many companies are adopting AI for productivity gains and creation of new business opportunities which provide value to their customers.Trend Micro Research : CloudTrend Micro Research : How ToTrend Micro Research : Artificial Intelligence (AI)Trend Micro Research : Privacy & RisksTrend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsJoy NgaruroAI Pulse: The Good from AI and the Promise of Agentic
https://www.trendmicro.com/en_us/research/24/l/good-agentic-ai.html
urn:uuid:111ac01c-2bdf-2ea2-91cd-602c8e3907a4Sun, 01 Dec 2024 00:00:00 +0000The perils of AI get a lot of airtime, but what are the upsides? This issue of AI Pulse looks at some of the good AI can bring, from strengthening cybersecurity to driving health breakthroughs—and how the coming wave of agentic AI is going to take those possibilities to a whole new level.Trend Micro Research : Latest NewsTrend Micro Research : Cyber CrimeTrend Micro Research : WebTrend Micro Research : Cyber ThreatsTrend Micro Research : EndpointsTrend Micro Research : Artificial Intelligence (AI)Trend Micro Research : MobileTrend Micro Research : Articles, News, ReportsAI TeamGuess Who’s Back - The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024
https://www.trendmicro.com/en_us/research/24/k/return-of-anel-in-the-recent-earth-kasha-spearphishing-campaign.html
urn:uuid:6f3236a8-4564-87c2-9860-6db0873c7b5cTue, 26 Nov 2024 00:00:00 +0000Trend Micro has identified a spear-phishing campaign active in Japan since June 2024. Evidence about the malware used by this campaign suggests this was part of a new operation by Earth Kasha.Trend Micro Research : APT & Targeted AttacksTrend Micro Research : EndpointsTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsHara HiroakiGame of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions
https://www.trendmicro.com/en_us/research/24/k/earth-estries.html
urn:uuid:c74084d4-5fae-a65e-557f-c6528ab93863Mon, 25 Nov 2024 00:00:00 +0000Since 2023, APT group Earth Estries has aggressively targeted key industries globally with sophisticated techniques and new backdoors, like GHOSTSPIDER and MASOL RAT, for prolonged espionage operations. Trend Micro Research : Latest NewsTrend Micro Research : APT & Targeted AttacksTrend Micro Research : ResearchLeon M ChangEmbracing a Risk-Based Cybersecurity Approach With ASRM
https://www.trendmicro.com/en_us/research/22/d/proactive-cyber-risk-management-strategies.html
urn:uuid:2d89872a-4877-b4bf-92fe-108aa1520b15Mon, 25 Nov 2024 00:00:00 +0000Explore how a risk-based cybersecurity approach is critical to proactively stopping dynamic, ever-evolving threatsTrend Micro Research : Cyber CrimeTrend Micro Research : Expert PerspectiveTrend Micro Research : Privacy & RisksTrend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsJuan Pablo CastroSpot the Difference: Earth Kasha's New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella
https://www.trendmicro.com/en_us/research/24/k/lodeinfo-campaign-of-earth-kasha.html
urn:uuid:25548714-aaa2-d531-a4bc-cf505751165bTue, 19 Nov 2024 00:00:00 +0000LODEINFO is a malware used in attacks targeting mainly Japan since 2019. Trend Micro has been tracking the group as Earth Kasha. We have identified a new campaign connected to this group with significant updates to their strategy, tactics, and arsenals.Trend Micro Research : APT & Targeted AttacksTrend Micro Research : EndpointsTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsHara HiroakiInside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices
https://www.trendmicro.com/en_us/research/24/k/water-barghest.html
urn:uuid:03389c34-df1d-28eb-b167-ec6bc11f7c51Mon, 18 Nov 2024 00:00:00 +0000In this blog entry, we discuss Water Barghest's exploitation of IoT devices, transforming them into profitable assets through advanced automation and monetization techniques.Trend Micro Research : Articles, News, ReportsTrend Micro Research : ThreatsTrend Micro Research : IoTFeike Hacquebord5 AI Security Takeaways featuring Forrester
https://www.trendmicro.com/en_us/research/24/j/forrester-ai-security.html
urn:uuid:f35d0f94-6a43-d9e4-68c0-3e9983879245Wed, 13 Nov 2024 00:00:00 +0000Highlights from the recent discussion between Trend Micro’s David Roth, CRO Enterprise America, and guest speaker Jeff Pollard, VP, Principal Analyst, Forrester about AI hype versus reality and how to secure AI in the workplace.Trend Micro Research : Cyber CrimeTrend Micro Research : WebTrend Micro Research : Cyber ThreatsTrend Micro Research : EndpointsTrend Micro Research : Artificial Intelligence (AI)Trend Micro Research : VideoTrend Micro Research : NetworkTrend Micro Research : Security StrategiesTrend Micro and Japanese Partners Reveal Hidden Connections Among SEO Malware Operations
https://www.trendmicro.com/en_us/research/24/k/seo-malware.html
urn:uuid:884a37d8-b7ca-88ff-6f03-1fb493fd72fcMon, 11 Nov 2024 00:00:00 +0000Trend Micro researchers, in collaboration with Japanese authorities, analyzed links between SEO malware families used in SEO poisoning attacks that lead users to fake shopping sites.Trend Micro Research : Latest NewsTrend Micro Research : Articles, News, ReportsTrend Micro Research : ResearchMakoto ShimamuraBreaking Down Earth Estries' Persistent TTPs in Prolonged Cyber Operations
https://www.trendmicro.com/en_us/research/24/k/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-o.html
urn:uuid:af1eafb5-cda0-7f9a-5e6d-f97a0ec28008Fri, 08 Nov 2024 00:00:00 +0000Discover how Earth Estries employs a diverse set of tactics, techniques, and tools, including malware such as Zingdoor and Snappybee, for its campaigns.
Trend Micro Research : APT & Targeted AttacksTrend Micro Research : EndpointsTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsTed LeeSOC Around the Clock: World Tour Survey Findings
https://www.trendmicro.com/en_us/research/24/k/world-tour-survey-results.html
urn:uuid:10b943f8-9051-4487-c9b5-be7eb9a15758Mon, 04 Nov 2024 00:00:00 +0000Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what SOC teams had to say.Trend Micro Research : Cyber CrimeTrend Micro Research : WebTrend Micro Research : ResearchTrend Micro Research : Cyber ThreatsTrend Micro Research : Compliance & RisksTrend Micro Research : EndpointsTrend Micro Research : NetworkTrend Micro Research : Articles, News, ReportsAI Pulse: Election Deepfakes, Disasters, Scams & more
https://www.trendmicro.com/en_us/research/24/j/ai-election-deepfakes.html
urn:uuid:4dc03d90-284f-017a-ac09-fac067859e5eThu, 31 Oct 2024 00:00:00 +0000In the final weeks before November’s U.S. election, cybersecurity experts were calling October 2024 the “month of mischief”—a magnet for bad actors looking to disrupt the democratic process through AI-generated misinformation. This issue of AI Pulse looks at what can be done about deepfakes and other AI scams, and why defense-in-depth is the only way to go.Trend Micro Research : Cyber CrimeTrend Micro Research : WebTrend Micro Research : Social MediaTrend Micro Research : Expert PerspectiveTrend Micro Research : Cyber ThreatsTrend Micro Research : Artificial Intelligence (AI)Trend Micro Research : MobileTrend Micro Research : Articles, News, ReportsAI TeamAttacker Abuses Victim Resources to Reap Rewards from Titan Network
https://www.trendmicro.com/en_us/research/24/j/titan-network.html
urn:uuid:8edc3119-2f51-38e1-b313-3da653f550c9Wed, 30 Oct 2024 00:00:00 +0000In this blog entry, we discuss how an attacker took advantage of the Atlassian Confluence vulnerability CVE-2023-22527 to connect servers to the Titan Network for cryptomining purposes.Trend Micro Research : Articles, News, ReportsTrend Micro Research : ResearchTrend Micro Research : Cyber ThreatsRanga DuraisamyUnderstanding the Initial Stages of Web Shell and VPN Threats: An MXDR Analysis
https://www.trendmicro.com/en_us/research/24/j/understanding-the-initial-stages-of-web-shell-and-vpn-threats-an.html
urn:uuid:8825e60f-210b-f30c-06b8-971e0d1a4f46Thu, 24 Oct 2024 00:00:00 +0000While cyberattacks that employ web shells and VPN compromise are not particularly novel, they are still prevalent. The recent incidents that Trend Micro MXDR analyzed
highlight the importance of behavioral analysis and anomaly detection in security measures.Trend Micro Research : EndpointsTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsRyan MaglaqueUnmasking Prometei: A Deep Dive Into Our MXDR Findings
https://www.trendmicro.com/en_us/research/24/j/unmasking-prometei-a-deep-dive-into-our-mxdr-findings.html
urn:uuid:411acf7b-ecec-eaea-c071-9730dafb519aWed, 23 Oct 2024 00:00:00 +0000How does Prometei insidiously operate in a compromised system? This Managed Extended Detection and Response investigation conducted with the help of Trend Vision One provides a comprehensive analysis of the inner workings of this botnet so users can stop the threat in its tracks before it inflicts damage to the system.Trend Micro Research : EndpointsTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsBuddy TancioUsing gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach
https://www.trendmicro.com/en_us/research/24/j/using-grpc-http-2-for-cryptominer-deployment.html
urn:uuid:c8c5f712-a362-e7a1-0574-c3396854d0ddTue, 22 Oct 2024 00:00:00 +0000In this blog entry, we discuss how malicious actors are exploiting Docker remote API servers via gRPC/h2c to deploy the cryptominer SRBMiner to facilitate their mining of XRP on Docker hosts.Trend Micro Research : Latest NewsTrend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsAbdelrahman EsmailAttackers Target Exposed Docker Remote API Servers With perfctl Malware
https://www.trendmicro.com/en_us/research/24/j/attackers-target-exposed-docker-remote-api-servers-with-perfctl-.html
urn:uuid:4e46276f-3fff-7942-cad5-52b9ccf82194Mon, 21 Oct 2024 00:00:00 +0000We observed an unknown threat actor abusing exposed Docker remote API servers to deploy the perfctl malware.Trend Micro Research : CloudTrend Micro Research : MalwareTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsSunil BhartiGartner 2024 CNAPP Market Guide Insights for Leaders
https://www.trendmicro.com/en_us/research/24/j/gartner-2024-cnapp-market-guide.html
urn:uuid:e3e8ad5e-3d59-e8b8-abd8-9037029efa81Fri, 18 Oct 2024 00:00:00 +0000As businesses increasingly pivot to cloud-native applications, the landscape of cybersecurity becomes ever more challenging.Trend Micro Research : CloudTrend Micro Research : Compliance & RisksTrend Micro Research : ReportsTrend Micro Research : Privacy & RisksTrend Micro Research : Articles, News, ReportsHow to Mitigate the Impact of Rogue AI Risks
https://www.trendmicro.com/en_us/research/24/j/mitigate-rogue-ai-risks.html
urn:uuid:d1387812-8ed6-a7f4-ba17-6d867ccb4f92Thu, 17 Oct 2024 00:00:00 +0000This is the latest blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights.Trend Micro Research : CloudTrend Micro Research : Cyber CrimeTrend Micro Research : Artificial Intelligence (AI)Trend Micro Research : Expert PerspectiveTrend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsAI TeamFake LockBit, Real Damage: Ransomware Samples Abuse Amazon S3 to Steal Data
https://www.trendmicro.com/en_us/research/24/j/fake-lockbit-real-damage-ransomware-samples-abuse-aws-s3-to-stea.html
urn:uuid:8949ce10-4ab1-cc55-923b-3464cd19ada3Wed, 16 Oct 2024 00:00:00 +0000This article uncovers a Golang ransomware abusing Amazon S3 for data theft, and masking as LockBit to further pressure victims. The discovery of hard-coded AWS credentials in these samples led to AWS account suspensions.Trend Micro Research : CloudTrend Micro Research : RansomwareTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsJaromir HorejsiSilent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions
https://www.trendmicro.com/en_us/research/24/j/edrsilencer-disrupting-endpoint-security-solutions.html
urn:uuid:1be85902-d0e9-109f-09ba-a6ddef18598bTue, 15 Oct 2024 00:00:00 +0000Trend Micro's Threat Hunting Team has observed EDRSilencer, a red team tool that threat actors are attempting to abuse for its ability to block EDR traffic and conceal malicious activity.Trend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsTrend Micro Research : ResearchJacob SantosWater Makara Uses Obfuscated JavaScript in Spear Phishing Campaign, Targets Brazil With Astaroth Malware
https://www.trendmicro.com/en_us/research/24/j/water-makara-uses-obfuscated-javascript-in-spear-phishing-campai.html
urn:uuid:70d0c294-6cbf-357c-2f72-aa0d1b449844Mon, 14 Oct 2024 00:00:00 +0000Trend Micro researchers have uncovered a surge of malicious activities involving a threat actor group that we track as Water Makara. This group is targeting enterprises in Brazil, deploying banking malware using obfuscated JavaScript to slip past security defenses.Trend Micro Research : APT & Targeted AttacksTrend Micro Research : EndpointsTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsCharles Adrian MartyEarth Simnavaz (aka APT34) Levies Advanced Cyberattacks Against Middle East
https://www.trendmicro.com/en_us/research/24/j/earth-simnavaz-cyberattacks.html
urn:uuid:91f88f28-9e9c-cd4f-ce12-bde1ef5ee214Fri, 11 Oct 2024 00:00:00 +0000Trend Micro's investigation into the recent activity of Earth Simnavaz provides new insights into the APT group’s evolving tactics and the immediate threat it poses to sectors in the Middle East.Trend Micro Research : APT & Targeted AttacksTrend Micro Research : Articles, News, ReportsTrend Micro Research : ResearchMohamed FahmyHarnessing AI for Enhanced Security
https://www.trendmicro.com/en_us/research/24/j/enhanced-security-ai.html
urn:uuid:138074db-0a05-a0f5-0e37-bcf05509a19aTue, 08 Oct 2024 00:00:00 +0000A deep-dive into how AI-driven solutions from Trend Micro leveraging the NVIDIA AI Enterprise software platform are elevating security across critical industries Trend Micro Research : CloudTrend Micro Research : Artificial Intelligence (AI)Trend Micro Research : Expert PerspectiveTrend Micro Research : Cyber ThreatsTrend Micro Research : Data centerFernando CardosoRogue AI: What the Security Community is Missing
https://www.trendmicro.com/en_us/research/24/j/rogue-ai-part-4.html
urn:uuid:d6e79b22-6478-3b4a-bc18-daefd14868ceThu, 03 Oct 2024 00:00:00 +0000This is the fourth blog post in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights.Trend Micro Research : CloudTrend Micro Research : Cyber CrimeTrend Micro Research : Expert PerspectiveTrend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsAI TeamMDR in Action: Preventing The More_eggs Backdoor From Hatching
https://www.trendmicro.com/en_us/research/24/i/mdr-in-action--preventing-the-moreeggs-backdoor-from-hatching--.html
urn:uuid:9bfb3796-2ba1-56df-f461-fd61c7b35372Mon, 30 Sep 2024 00:00:00 +0000Trend Micro MDR (Managed Detection and Response) team promptly mitigated a more_eggs infection. Using Vision One, MDR illustrated how Custom Filters/Models and Security Playbook can be used to automate the response to more_eggs and similar threats.Trend Micro Research : PhishingTrend Micro Research : MalwareTrend Micro Research : Articles, News, ReportsRyan SolivenAI Pulse: What's new in AI regulations?
https://www.trendmicro.com/en_us/research/24/i/ai-regulations-2024.html
urn:uuid:a5118c4c-5008-28a9-9c17-696b4e75640bMon, 30 Sep 2024 00:00:00 +0000Fall is in the air and frameworks for mitigating AI risk are dropping like leaves onto policymakers’ desks. From California’s SB 1047 bill and NIST’s model-testing deal with OpenAI and Anthropic to REAIM’s blueprint for military AI governance, AI regulation is proving to be a hot and complicated topic.Trend Micro Research : CloudTrend Micro Research : Latest NewsTrend Micro Research : Cyber CrimeTrend Micro Research : WebTrend Micro Research : Cyber ThreatsTrend Micro Research : Artificial Intelligence (AI)Trend Micro Research : NetworkTrend Micro Research : Articles, News, ReportsAI TeamTrend Detects NVIDIA AI Toolkit Vulnerability
https://www.trendmicro.com/en_us/research/24/i/nvidia-ai-container-toolkit-vulnerability-fix.html
urn:uuid:d549be3f-8101-61ff-a13c-f13a01e5d87eFri, 27 Sep 2024 00:00:00 +0000On Wednesday, NVIDIA released updates to fix a critical vulnerability in its NVIDIA Container Toolkit, which, if exploited, could put a wide range of AI infrastructure and underlying data/secrets at risk.Trend Micro Research : Cyber CrimeTrend Micro Research : Exploits & VulnerabilitiesTrend Micro Research : Artificial Intelligence (AI)Trend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsTrend Micro Research : Data centerCybersecurity Compass: Bridging the Communication Gap
https://www.trendmicro.com/en_us/research/24/i/cybersecurity-compass.html
urn:uuid:d2d855c4-9d65-fb57-ee25-925a03fda760Thu, 26 Sep 2024 00:00:00 +0000Discover how to use the Cybersecurity Compass to foster effective conversations about cybersecurity strategy between non-technical and technical audiences, focusing on the phases of before, during, and after a breach.Trend Micro Research : Cyber CrimeTrend Micro Research : WebTrend Micro Research : Privacy & RisksTrend Micro Research : Cyber ThreatsTrend Micro Research : EndpointsTrend Micro Research : NetworkTrend Micro Research : Security StrategiesTrend Micro Research : Articles, News, ReportsJuan Pablo CastroInaugural World Tour 2024 Survey Findings
https://www.trendmicro.com/en_us/research/24/i/world-tour-2024-survey.html
urn:uuid:36ac91b8-59c6-52e4-479e-2e450eb6b35aThu, 26 Sep 2024 00:00:00 +0000Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what CISOs had to say.Trend Micro Research : CloudTrend Micro Research : Cyber CrimeTrend Micro Research : ReportsTrend Micro Research : Privacy & RisksTrend Micro Research : Cyber ThreatsTrend Micro Research : ReportTrend Micro Research : EndpointsTrend Micro Research : NetworkEvolved Exploits Call for AI-Driven ASRM + XDR
https://www.trendmicro.com/en_us/research/24/i/ai-asrm-xdr.html
urn:uuid:8d5976b0-6b25-a95c-ca0e-0322b5177f9aTue, 24 Sep 2024 00:00:00 +0000AI-driven insights for managing emerging threats and minimizing organizational riskTrend Micro Research : CloudTrend Micro Research : Compliance & RisksTrend Micro Research : Expert PerspectiveTrend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsJon ClayHow Ransomhub Ransomware Uses EDRKillShifter to Disable EDR and Antivirus Protections
https://www.trendmicro.com/en_us/research/24/i/how-ransomhub-ransomware-uses-edrkillshifter-to-disable-edr-and-.html
urn:uuid:157137dc-64c5-5b36-ebf3-f10bf61ccde6Fri, 20 Sep 2024 00:00:00 +0000Trend Micro tracked this group as Water Bakunawa, behind the RansomHub ransomware, employs various anti-EDR techniques to play a high-stakes game of hide and seek with security solutions.Trend Micro Research : EndpointsTrend Micro Research : RansomwareTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsKyle Philippe YuEarth Baxia Uses Spear-Phishing and GeoServer Exploit to Target APAC
https://www.trendmicro.com/en_us/research/24/i/earth-baxia-spear-phishing-and-geoserver-exploit.html
urn:uuid:1ba9287e-a244-50b3-736d-5c2f37476c69Thu, 19 Sep 2024 00:00:00 +0000We observed Earth Baxia carrying out targeted attacks against APAC countries that involved advanced techniques like spear-phishing and customized malware, with data suggesting that the group operates from China.Trend Micro Research : PhishingTrend Micro Research : APT & Targeted AttacksTrend Micro Research : Articles, News, ReportsTed LeeIdentifying Rogue AI
https://www.trendmicro.com/en_us/research/24/i/rogue-ai-part-3.html
urn:uuid:4441f410-7fad-454a-0e65-9862a578d15aThu, 19 Sep 2024 00:00:00 +0000This is the third blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights.Trend Micro Research : CloudTrend Micro Research : Cyber CrimeTrend Micro Research : Artificial Intelligence (AI)Trend Micro Research : Expert PerspectiveTrend Micro Research : Articles, News, ReportsTrend Micro Research : Cyber ThreatsAI TeamVulnerabilities in Cellular Packet Cores Part IV: Authentication
https://www.trendmicro.com/en_us/research/24/i/vulnerabilities-in-cellular-packet-cores-part-iv-authentication.html
urn:uuid:9229791b-41da-b5ff-cf4b-71de17f04643Wed, 18 Sep 2024 00:00:00 +0000Our research reveals two significant vulnerabilities in Microsoft Azure Private 5G Core (AP5GC). The first vulnerability (CVE-2024-20685) allows a crafted signaling message to crash the control plane, leading to potential service outages. The second (ZDI-CAN-23960) disconnects and replaces attached base stations, disrupting network operations. While these issues are implementation-specific, their exploitation is made possible by a systemic weakness: the lack of mandatory authentication procedures between base stations and packet-cores.Trend Micro Research : Exploits & VulnerabilitiesTrend Micro Research : ResearchTrend Micro Research : NetworkTrend Micro Research : Articles, News, ReportsRichard Y LinProtecting Against RCE Attacks Abusing WhatsUp Gold Vulnerabilities
https://www.trendmicro.com/en_us/research/24/i/whatsup-gold-rce.html
urn:uuid:aac20ec2-ae7d-8418-ecf0-ef3ef68e2b21Thu, 12 Sep 2024 00:00:00 +0000In this blog entry, we provide an analysis of the recent remote code execution attacks related to Progress Software’s WhatsUp Gold that possibly abused the vulnerabilities CVE-2024-6670 and CVE-2024-6671.Trend Micro Research : Articles, News, ReportsTrend Micro Research : ResearchTrend Micro Research : Exploits & VulnerabilitiesHitomi KimuraEarth Preta Evolves its Attacks with New Malware and Strategies
https://www.trendmicro.com/en_us/research/24/i/earth-preta-new-malware-and-strategies.html
urn:uuid:2c898e8e-392f-f12f-cd3a-b5bda1c7fe45Mon, 09 Sep 2024 00:00:00 +0000In this blog entry, we discuss our analysis of Earth Preta’s enhancements in their attacks by introducing new tools, malware variants and strategies to their worm-based attacks and their time-sensitive spear-phishing campaign. Trend Micro Research : MalwareTrend Micro Research : Articles, News, ReportsTrend Micro Research : ResearchLenart BermejoTIDRONE Targets Military and Satellite Industries in Taiwan
https://www.trendmicro.com/en_us/research/24/i/tidrone-targets-military-and-satellite-industries-in-taiwan.html
urn:uuid:d3733434-84c6-b442-4bec-41ad354849d4Fri, 06 Sep 2024 00:00:00 +0000Our research reveals that an unidentified threat cluster we named TIDRONE have shown significant interest in military-related industry chains, particularly in the manufacturers of drones.Trend Micro Research : APT & Targeted AttacksTrend Micro Research : EndpointsTrend Micro Research : ResearchTrend Micro Research : Articles, News, ReportsPierre Lee