Trend Micro Research : Articles, News, Reports

Agenda Ransomware Deploys Linux Variant on Windows Systems Through Remote Management Tools and BYOVD Techniques

Agenda Ransomware Deploys Linux Variant on Windows Systems Through Remote Management Tools and BYOVD Techniques 2025-10-23 at 21:13 By Trend™ Research identified a sophisticated Agenda ransomware attack that deployed a Linux variant on Windows systems. This cross-platform execution can make detection challenging for enterprises. This article is an excerpt from Trend Micro Research, News and […]

React to this headline:

Loading spinner

Agenda Ransomware Deploys Linux Variant on Windows Systems Through Remote Management Tools and BYOVD Techniques Read More »

Fast, Broad, and Elusive: How Vidar Stealer 2.0 Upgrades Infostealer Capabilities

Fast, Broad, and Elusive: How Vidar Stealer 2.0 Upgrades Infostealer Capabilities 2025-10-22 at 01:10 By Trend Research examines the latest version of the Vidar stealer, which features a full rewrite in C, a multithreaded architecture, and several enhancements that warrant attention. Its timely evolution suggests that Vidar is positioning itself to occupy the space left

React to this headline:

Loading spinner

Fast, Broad, and Elusive: How Vidar Stealer 2.0 Upgrades Infostealer Capabilities Read More »

Shifts in the Underground: The Impact of Water Kurita’s (Lumma Stealer) Doxxing

Shifts in the Underground: The Impact of Water Kurita’s (Lumma Stealer) Doxxing 2025-10-16 at 17:45 By A targeted underground doxxing campaign exposed alleged core members of Lumma Stealer (Water Kurita), resulting in a sharp decline in its activity and a migration of customers to rival infostealer platforms. This article is an excerpt from Trend Micro

React to this headline:

Loading spinner

Shifts in the Underground: The Impact of Water Kurita’s (Lumma Stealer) Doxxing Read More »

Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits

Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits 2025-10-15 at 23:22 By Trend™ Research has uncovered an attack campaign exploiting the Cisco SNMP vulnerability CVE-2025-20352, allowing remote code execution and rootkit deployment on unprotected devices, with impacts observed on Cisco 9400, 9300, and legacy 3750G series. This article is an excerpt from

React to this headline:

Loading spinner

Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits Read More »

Trend Micro launches new integration with Zscaler to deliver real-time, Risk-Based Zero Trust Access

Trend Micro launches new integration with Zscaler to deliver real-time, Risk-Based Zero Trust Access 2025-10-15 at 02:22 By Discover how Trend Vision One™ integrates with Zscaler to unify detection and access enforcement, accelerate threat containment, reduce dwell time, and deliver seamless Zero Trust protection for modern enterprises. This article is an excerpt from Trend Micro

React to this headline:

Loading spinner

Trend Micro launches new integration with Zscaler to deliver real-time, Risk-Based Zero Trust Access Read More »

Weaponized AI Assistants & Credential Thieves

Weaponized AI Assistants & Credential Thieves 2025-10-09 at 15:01 By Learn the state of AI and the NPM ecosystem with the recent s1ngularity’ weaponized AI for credential theft. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Weaponized AI Assistants & Credential Thieves Read More »

RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits

RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits 2025-10-09 at 15:01 By Trend™ Research and ZDI Threat Hunters have identified a large-scale RondoDox botnet campaign exploiting over 50 vulnerabilities across more than 30 vendors, including flaws first seen in Pwn2Own contests. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits Read More »

How Your AI Chatbot Can Become a Backdoor

How Your AI Chatbot Can Become a Backdoor 2025-10-08 at 17:54 By In this post of THE AI BREACH, learn how your Chatbot can become a backdoor. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

How Your AI Chatbot Can Become a Backdoor Read More »

CNAPP is the Solution to Multi-cloud Flexibility

CNAPP is the Solution to Multi-cloud Flexibility 2025-09-26 at 19:01 By Cloud-native application protection platform (CNAPP) not only helps organizations protect, but offers the flexibility of multi-cloud. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

CNAPP is the Solution to Multi-cloud Flexibility Read More »

This Is How Your LLM Gets Compromised

This Is How Your LLM Gets Compromised 2025-09-24 at 22:27 By Poisoned data. Malicious LoRAs. Trojan model files. AI attacks are stealthier than ever—often invisible until it’s too late. Here’s how to catch them before they catch you. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

This Is How Your LLM Gets Compromised Read More »

AI-Powered App Exposes User Data, Creates Risk of Supply Chain Attacks

AI-Powered App Exposes User Data, Creates Risk of Supply Chain Attacks 2025-09-24 at 01:02 By Trend™ Research’s analysis of Wondershare RepairIt reveals how the AI-driven app exposed sensitive user data due to unsecure cloud storage practices and hardcoded credentials, creating risks of model tampering and supply chain attacks. This article is an excerpt from Trend

React to this headline:

Loading spinner

AI-Powered App Exposes User Data, Creates Risk of Supply Chain Attacks Read More »

How AI-Native Development Platforms Enable Fake Captcha Pages

How AI-Native Development Platforms Enable Fake Captcha Pages 2025-09-19 at 11:45 By Cybercriminals are abusing AI-native platforms like Vercel, Netlify, and Lovable to host fake captcha pages that deceive users, bypass detection, and drive phishing campaigns. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

How AI-Native Development Platforms Enable Fake Captcha Pages Read More »

What We Know About the NPM Supply Chain Attack

What We Know About the NPM Supply Chain Attack 2025-09-18 at 13:34 By Trend™ Research outlines the critical details behind the ongoing NPM supply chain attack and offers essential steps to stay protected against potential compromise. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

What We Know About the NPM Supply Chain Attack Read More »

What’s Your Cybersecurity Maturity?

What’s Your Cybersecurity Maturity? 2025-09-10 at 10:53 By This blog post looks at four key milestones along the cybersecurity maturity journey and poses some questions you can ask to determine the stage of your organization’s progress. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

What’s Your Cybersecurity Maturity? Read More »

Unmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed

Unmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed 2025-09-09 at 13:08 By An analysis of the Gentlemen ransomware group, which employs advanced, adaptive tactics, techniques, and procedure to target critical industries worldwide. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Unmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed Read More »

An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via ‘Cracked’ Apps

An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via ‘Cracked’ Apps 2025-09-04 at 22:22 By Trend™ Research analyzed a campaign distributing Atomic macOS Stealer (AMOS), a malware family targeting macOS users. Attackers disguise the malware as “cracked” versions of legitimate apps, luring users into installation. This article is an excerpt from Trend Micro

React to this headline:

Loading spinner

An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via ‘Cracked’ Apps Read More »

Operation Serengeti 2.0: Trend Micro Helps Law Enforcement Fight Cybercrime in Africa

Operation Serengeti 2.0: Trend Micro Helps Law Enforcement Fight Cybercrime in Africa 2025-08-29 at 11:21 By Operation Serengeti 2.0: With Trend Micro’s support, INTERPOL led a major crackdown across Africa, arresting cybercriminals, dismantling infrastructures, recovering illicit funds, and protecting tens of thousands of victims. This article is an excerpt from Trend Micro Research, News and

React to this headline:

Loading spinner

Operation Serengeti 2.0: Trend Micro Helps Law Enforcement Fight Cybercrime in Africa Read More »

TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents

TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents 2025-08-28 at 14:22 By The TAOTH campaign exploited abandoned software and spear-phishing to deploy multiple malware families, targeting dissidents and other high-value individuals across Eastern Asia. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents Read More »

Leadership, Innovation, and the Future of AI: Lessons from Trend Micro CEO & Co-Founder Eva Chen

Leadership, Innovation, and the Future of AI: Lessons from Trend Micro CEO & Co-Founder Eva Chen 2025-08-23 at 04:02 By Discover how AI is reshaping cybersecurity through our CEO, Eva Chen’s industry briefing series. Gain practical strategies, real-world insights, and a clear roadmap to secure your AI initiatives with confidence. This article is an excerpt

React to this headline:

Loading spinner

Leadership, Innovation, and the Future of AI: Lessons from Trend Micro CEO & Co-Founder Eva Chen Read More »

Warlock: From SharePoint Vulnerability Exploit to Enterprise Ransomware

Warlock: From SharePoint Vulnerability Exploit to Enterprise Ransomware 2025-08-20 at 19:25 By Warlock ransomware exploits unpatched Microsoft SharePoint vulnerabilities to gain access, escalate privileges, steal credentials, move laterally, and deploy ransomware with data exfiltration across enterprise environments. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this

React to this headline:

Loading spinner

Warlock: From SharePoint Vulnerability Exploit to Enterprise Ransomware Read More »

Scroll to Top