Trend Micro Research : Articles, News, Reports

An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via ‘Cracked’ Apps

An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via ‘Cracked’ Apps 2025-09-04 at 22:22 By Trend™ Research analyzed a campaign distributing Atomic macOS Stealer (AMOS), a malware family targeting macOS users. Attackers disguise the malware as “cracked” versions of legitimate apps, luring users into installation. This article is an excerpt from Trend Micro […]

React to this headline:

Loading spinner

An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via ‘Cracked’ Apps Read More »

Operation Serengeti 2.0: Trend Micro Helps Law Enforcement Fight Cybercrime in Africa

Operation Serengeti 2.0: Trend Micro Helps Law Enforcement Fight Cybercrime in Africa 2025-08-29 at 11:21 By Operation Serengeti 2.0: With Trend Micro’s support, INTERPOL led a major crackdown across Africa, arresting cybercriminals, dismantling infrastructures, recovering illicit funds, and protecting tens of thousands of victims. This article is an excerpt from Trend Micro Research, News and

React to this headline:

Loading spinner

Operation Serengeti 2.0: Trend Micro Helps Law Enforcement Fight Cybercrime in Africa Read More »

TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents

TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents 2025-08-28 at 14:22 By The TAOTH campaign exploited abandoned software and spear-phishing to deploy multiple malware families, targeting dissidents and other high-value individuals across Eastern Asia. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents Read More »

Leadership, Innovation, and the Future of AI: Lessons from Trend Micro CEO & Co-Founder Eva Chen

Leadership, Innovation, and the Future of AI: Lessons from Trend Micro CEO & Co-Founder Eva Chen 2025-08-23 at 04:02 By Discover how AI is reshaping cybersecurity through our CEO, Eva Chen’s industry briefing series. Gain practical strategies, real-world insights, and a clear roadmap to secure your AI initiatives with confidence. This article is an excerpt

React to this headline:

Loading spinner

Leadership, Innovation, and the Future of AI: Lessons from Trend Micro CEO & Co-Founder Eva Chen Read More »

Warlock: From SharePoint Vulnerability Exploit to Enterprise Ransomware

Warlock: From SharePoint Vulnerability Exploit to Enterprise Ransomware 2025-08-20 at 19:25 By Warlock ransomware exploits unpatched Microsoft SharePoint vulnerabilities to gain access, escalate privileges, steal credentials, move laterally, and deploy ransomware with data exfiltration across enterprise environments. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this

React to this headline:

Loading spinner

Warlock: From SharePoint Vulnerability Exploit to Enterprise Ransomware Read More »

Crypto24 Ransomware Group Blends Legitimate Tools with Custom Malware for Stealth Attacks

Crypto24 Ransomware Group Blends Legitimate Tools with Custom Malware for Stealth Attacks 2025-08-14 at 11:38 By Crypto24 is a ransomware group that stealthily blends legitimate tools with custom malware, using advanced evasion techniques to bypass security and EDR technologies. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

Crypto24 Ransomware Group Blends Legitimate Tools with Custom Malware for Stealth Attacks Read More »

New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises

New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises 2025-08-12 at 13:10 By We uncovered Charon, a new ransomware strainfamily that uses advanced APT-style techniques, including DLL sideloading, process injection, and anti-EDR capabilities, to target organizations with customized ransom demands. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises Read More »

New Ransomware Charon Uses Earth Baxia APT Techniques To Target Enterprises

New Ransomware Charon Uses Earth Baxia APT Techniques To Target Enterprises 2025-08-12 at 13:10 By We uncovered Charon, a new ransomware strainfamily that uses advanced APT-style techniques, including DLL sideloading, process injection, and anti-EDR capabilities, to target organizations with customized ransom demands. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

New Ransomware Charon Uses Earth Baxia APT Techniques To Target Enterprises Read More »

Gunra Ransomware Group Unveils Efficient Linux Variant

Gunra Ransomware Group Unveils Efficient Linux Variant 2025-07-29 at 15:02 By This blog discusses how Gunra ransomware’s new Linux variant accelerates and customizes encryption, expanding the group’s reach with advanced cross-platform tactics. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Gunra Ransomware Group Unveils Efficient Linux Variant Read More »

Revisiting UNC3886 Tactics to Defend Against Present Risk

Revisiting UNC3886 Tactics to Defend Against Present Risk 2025-07-28 at 16:49 By We examine the past tactics used by UNC3886 to gain insight on how to best strengthen defenses against the ongoing and emerging threats of this APT group. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

Revisiting UNC3886 Tactics to Defend Against Present Risk Read More »

Proactive Email Security: The Power of AI

Proactive Email Security: The Power of AI 2025-07-25 at 01:27 By Lead with AI-powered email security to stay ahead of attackers and personalize user interaction at every touchpoint, bridging technology and behavior with precision. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Proactive Email Security: The Power of AI Read More »

Proactive Security and Insights for SharePoint Attacks (CVE-2025-53770 and CVE-2025-53771)

Proactive Security and Insights for SharePoint Attacks (CVE-2025-53770 and CVE-2025-53771) 2025-07-22 at 02:18 By CVE-2025-53770 and CVE-2025-53771 are vulnerabilities in on-premise Microsoft SharePoint Servers that evolved from previously patched flaws, allowing unauthenticated remote code execution through advanced deserialization and ViewState abuse. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

Proactive Security and Insights for SharePoint Attacks (CVE-2025-53770 and CVE-2025-53771) Read More »

Securing Tomorrow: An Interview with Trend Micro VP of Product Management Michael Habibi

Securing Tomorrow: An Interview with Trend Micro VP of Product Management Michael Habibi 2025-07-18 at 19:13 By Proactive security in a rapidly evolving threat landscape This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Securing Tomorrow: An Interview with Trend Micro VP of Product Management Michael Habibi Read More »

CISA’s NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security

CISA’s NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security 2025-07-15 at 19:03 By This blog explores key findings from CISA’s NIMBUS 2000 Cloud Identity Security Technical Exchange and how Trend Vision One™ Cloud Security aligns with these priorities. It highlights critical challenges in token validation, secrets management, and logging visibility—offering insights into

React to this headline:

Loading spinner

CISA’s NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security Read More »

Preventing Zero-Click AI Threats: Insights from EchoLeak

Preventing Zero-Click AI Threats: Insights from EchoLeak 2025-07-15 at 13:04 By A zero-click exploit called EchoLeak reveals how AI assistants like Microsoft 365 Copilot can be manipulated to leak sensitive data without user interaction. This entry breaks down how the attack works, why it matters, and what defenses are available to proactively mitigate this emerging

React to this headline:

Loading spinner

Preventing Zero-Click AI Threats: Insights from EchoLeak Read More »

BERT Ransomware Group Targets Asia and Europe on Multiple Platforms

BERT Ransomware Group Targets Asia and Europe on Multiple Platforms 2025-07-07 at 14:47 By BERT is a newly emerged ransomware group that pairs simple code with effective execution—carrying out attacks across Europe and Asia. In this entry, we examine the group’s tactics, how their variants have evolved, and the tools they use to get past

React to this headline:

Loading spinner

BERT Ransomware Group Targets Asia and Europe on Multiple Platforms Read More »

AI Dilemma: Emerging Tech as Cyber Risk Escalates

AI Dilemma: Emerging Tech as Cyber Risk Escalates 2025-07-04 at 07:17 By As AI adoption accelerates, businesses face mounting cyber threats—and urgent choices about secure implementation This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

AI Dilemma: Emerging Tech as Cyber Risk Escalates Read More »

Why Trend Micro Continues to be Named a CNAPP Leader

Why Trend Micro Continues to be Named a CNAPP Leader 2025-06-28 at 01:01 By Trend Micro is recognized for our Cloud CNAPP capabilities and product strategy—affirming our vision to deliver a cloud security solution that predicts, protects, and responds to threats across hybrid and multi-cloud environments. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

Why Trend Micro Continues to be Named a CNAPP Leader Read More »

Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI Agent

Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI Agent 2025-06-24 at 16:47 By A single SQL injection bug in Anthropic’s SQLite MCP server—forked over 5,000 times—can seed stored prompts, exfiltrate data, and hand attackers the keys to entire agent workflows. This entry unpacks the attack chain and lays out concrete fixes to

React to this headline:

Loading spinner

Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI Agent Read More »

Enabling Secure AI Inference: Trend Cybertron Leverages NVIDIA Universal LLM NIM Microservices

Enabling Secure AI Inference: Trend Cybertron Leverages NVIDIA Universal LLM NIM Microservices 2025-06-11 at 15:05 By Learn how Trend’s Cybertron has been harnessing the power of NVIDIA Universal LLM NIM Microservices. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Enabling Secure AI Inference: Trend Cybertron Leverages NVIDIA Universal LLM NIM Microservices Read More »

Scroll to Top