Trend Micro Research : Articles, News, Reports

Proactive Email Security: The Power of AI

Proactive Email Security: The Power of AI 2025-07-25 at 01:27 By Lead with AI-powered email security to stay ahead of attackers and personalize user interaction at every touchpoint, bridging technology and behavior with precision. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Proactive Email Security: The Power of AI Read More »

Proactive Security and Insights for SharePoint Attacks (CVE-2025-53770 and CVE-2025-53771)

Proactive Security and Insights for SharePoint Attacks (CVE-2025-53770 and CVE-2025-53771) 2025-07-22 at 02:18 By CVE-2025-53770 and CVE-2025-53771 are vulnerabilities in on-premise Microsoft SharePoint Servers that evolved from previously patched flaws, allowing unauthenticated remote code execution through advanced deserialization and ViewState abuse. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

Proactive Security and Insights for SharePoint Attacks (CVE-2025-53770 and CVE-2025-53771) Read More »

Securing Tomorrow: An Interview with Trend Micro VP of Product Management Michael Habibi

Securing Tomorrow: An Interview with Trend Micro VP of Product Management Michael Habibi 2025-07-18 at 19:13 By Proactive security in a rapidly evolving threat landscape This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Securing Tomorrow: An Interview with Trend Micro VP of Product Management Michael Habibi Read More »

CISA’s NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security

CISA’s NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security 2025-07-15 at 19:03 By This blog explores key findings from CISA’s NIMBUS 2000 Cloud Identity Security Technical Exchange and how Trend Vision One™ Cloud Security aligns with these priorities. It highlights critical challenges in token validation, secrets management, and logging visibility—offering insights into

React to this headline:

Loading spinner

CISA’s NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security Read More »

Preventing Zero-Click AI Threats: Insights from EchoLeak

Preventing Zero-Click AI Threats: Insights from EchoLeak 2025-07-15 at 13:04 By A zero-click exploit called EchoLeak reveals how AI assistants like Microsoft 365 Copilot can be manipulated to leak sensitive data without user interaction. This entry breaks down how the attack works, why it matters, and what defenses are available to proactively mitigate this emerging

React to this headline:

Loading spinner

Preventing Zero-Click AI Threats: Insights from EchoLeak Read More »

BERT Ransomware Group Targets Asia and Europe on Multiple Platforms

BERT Ransomware Group Targets Asia and Europe on Multiple Platforms 2025-07-07 at 14:47 By BERT is a newly emerged ransomware group that pairs simple code with effective execution—carrying out attacks across Europe and Asia. In this entry, we examine the group’s tactics, how their variants have evolved, and the tools they use to get past

React to this headline:

Loading spinner

BERT Ransomware Group Targets Asia and Europe on Multiple Platforms Read More »

AI Dilemma: Emerging Tech as Cyber Risk Escalates

AI Dilemma: Emerging Tech as Cyber Risk Escalates 2025-07-04 at 07:17 By As AI adoption accelerates, businesses face mounting cyber threats—and urgent choices about secure implementation This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

AI Dilemma: Emerging Tech as Cyber Risk Escalates Read More »

Why Trend Micro Continues to be Named a CNAPP Leader

Why Trend Micro Continues to be Named a CNAPP Leader 2025-06-28 at 01:01 By Trend Micro is recognized for our Cloud CNAPP capabilities and product strategy—affirming our vision to deliver a cloud security solution that predicts, protects, and responds to threats across hybrid and multi-cloud environments. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

Why Trend Micro Continues to be Named a CNAPP Leader Read More »

Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI Agent

Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI Agent 2025-06-24 at 16:47 By A single SQL injection bug in Anthropic’s SQLite MCP server—forked over 5,000 times—can seed stored prompts, exfiltrate data, and hand attackers the keys to entire agent workflows. This entry unpacks the attack chain and lays out concrete fixes to

React to this headline:

Loading spinner

Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI Agent Read More »

Enabling Secure AI Inference: Trend Cybertron Leverages NVIDIA Universal LLM NIM Microservices

Enabling Secure AI Inference: Trend Cybertron Leverages NVIDIA Universal LLM NIM Microservices 2025-06-11 at 15:05 By Learn how Trend’s Cybertron has been harnessing the power of NVIDIA Universal LLM NIM Microservices. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Enabling Secure AI Inference: Trend Cybertron Leverages NVIDIA Universal LLM NIM Microservices Read More »

Earth Lamia Develops Custom Arsenal to Target Multiple Industries

Earth Lamia Develops Custom Arsenal to Target Multiple Industries 2025-05-27 at 12:02 By Trend™ Research has been tracking an active APT threat actor named Earth Lamia, targeting multiple industries in Brazil, India and Southeast Asia countries at least since 2023. The threat actor primarily exploits vulnerabilities in web applications to gain access to targeted organizations.

React to this headline:

Loading spinner

Earth Lamia Develops Custom Arsenal to Target Multiple Industries Read More »

Fake CAPTCHA Attacks Deploy Infostealers and RATs in a Multistage Payload Chain

Fake CAPTCHA Attacks Deploy Infostealers and RATs in a Multistage Payload Chain 2025-05-22 at 12:23 By We have detected a new tactic involving fake CAPTCHA pages that trick users into executing harmful commands in Windows. This scheme uses disguised files sent via phishing and other malicious methods. This article is an excerpt from Trend Micro

React to this headline:

Loading spinner

Fake CAPTCHA Attacks Deploy Infostealers and RATs in a Multistage Payload Chain Read More »

Trend Joins NVIDIA to Secure AI Infrastructure with NVIDIA

Trend Joins NVIDIA to Secure AI Infrastructure with NVIDIA 2025-05-19 at 06:03 By Together, we are focused on securing the full AI lifecycle—from development and training to deployment and inference—across cloud, data center, and AI factories. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Trend Joins NVIDIA to Secure AI Infrastructure with NVIDIA Read More »

Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan

Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan 2025-05-13 at 10:16 By Trend™ Research discusses the evolving tradecraft of threat actor Earth Ammit, proven by the advanced toolset used in its TIDRONE and VENOM campaigns that targeted the drone supply chain. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan Read More »

Agenda Ransomware Group Adds SmokeLoader and NETXLOADER to Their Arsenal

Agenda Ransomware Group Adds SmokeLoader and NETXLOADER to Their Arsenal 2025-05-07 at 11:48 By During our monitoring of Agenda ransomware activities, we uncovered campaigns that made use of the SmokeLoader malware and a new loader we’ve named NETXLOADER. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

Agenda Ransomware Group Adds SmokeLoader and NETXLOADER to Their Arsenal Read More »

Exploring PLeak: An Algorithmic Method for System Prompt Leakage

Exploring PLeak: An Algorithmic Method for System Prompt Leakage 2025-05-01 at 12:03 By What is PLeak, and what are the risks associated with it? We explored this algorithmic technique and how it can be used to jailbreak LLMs, which could be leveraged by threat actors to manipulate systems and steal sensitive data. This article is

React to this headline:

Loading spinner

Exploring PLeak: An Algorithmic Method for System Prompt Leakage Read More »

Earth Kasha Updates TTPs in Latest Campaign Targeting Taiwan and Japan

Earth Kasha Updates TTPs in Latest Campaign Targeting Taiwan and Japan 2025-04-30 at 12:02 By This blog discusses the latest modifications observed in Earth Kasha’s TTPs from their latest campaign detected in March 2025 targeting Taiwan and Japan. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

Earth Kasha Updates TTPs in Latest Campaign Targeting Taiwan and Japan Read More »

NVIDIA Riva Vulnerabilities Leave AI-Powered Speech and Translation Services at Risk

NVIDIA Riva Vulnerabilities Leave AI-Powered Speech and Translation Services at Risk 2025-04-28 at 11:46 By Trend Research uncovered misconfigurations in NVIDIA Riva deployments, with two vulnerabilities, CVE-2025-23242 and CVE-2025-23243, contributing to their exposure. These security flaws could lead to unauthorized access, resource abuse, and potential misuse or theft of AI-powered inference services, including speech recognition

React to this headline:

Loading spinner

NVIDIA Riva Vulnerabilities Leave AI-Powered Speech and Translation Services at Risk Read More »

Earth Kurma APT Campaign Targets Southeast Asian Government, Telecom Sectors

Earth Kurma APT Campaign Targets Southeast Asian Government, Telecom Sectors 2025-04-25 at 11:22 By An APT group dubbed Earth Kurma is actively targeting government and telecommunications organizations in Southeast Asia using advanced malware, rootkits, and trusted cloud services to conduct cyberespionage. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

Earth Kurma APT Campaign Targets Southeast Asian Government, Telecom Sectors Read More »

Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations

Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations 2025-04-24 at 05:08 By In this blog entry, we discuss how North Korea’s significant role in cybercrime – including campaigns attributed to Void Dokkaebi – is facilitated by extensive use of anonymization networks and the use of Russian IP ranges. This article is an excerpt

React to this headline:

Loading spinner

Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations Read More »

Scroll to Top