Trend Micro Research : Articles, News, Reports

Increase in Lumma Stealer Activity Coincides with Use of Adaptive Browser Fingerprinting Tactics

Increase in Lumma Stealer Activity Coincides with Use of Adaptive Browser Fingerprinting Tactics 2025-11-13 at 21:17 By In this blog entry, Trend™ Research analyses the layered command-and-control approaches that Lumma Stealer uses to maintain its ongoing operations while enhancing collection of victim-environment data. This article is an excerpt from Trend Micro Research, News and Perspectives […]

React to this headline:

Loading spinner

Increase in Lumma Stealer Activity Coincides with Use of Adaptive Browser Fingerprinting Tactics Read More »

IBM Infrastructure: Continuous Risk & Compliance

IBM Infrastructure: Continuous Risk & Compliance 2025-11-12 at 02:00 By Learn all about AI-powered visibility, telemetry, and proactive security across mainframe, cloud, containers, and enterprise workloads. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

IBM Infrastructure: Continuous Risk & Compliance Read More »

How are you managing cloud risk?

How are you managing cloud risk? 2025-11-05 at 10:08 By Learn why managing cloud risk demands unified visibility, continuous risk assessment, and efficient security operations. Discover how a full-featured CNAPP like Trend Vision One™ Cloud Security enables organizations to move from reactive to proactive cloud protection. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

How are you managing cloud risk? Read More »

AI Security: NVIDIA BlueField Now with Vision One™

AI Security: NVIDIA BlueField Now with Vision One™ 2025-10-29 at 05:48 By Launching at NVIDIA GTC 2025 – Transforming AI Security with Trend Vision One™ on NVIDIA BlueField This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

AI Security: NVIDIA BlueField Now with Vision One™ Read More »

Active Water Saci Campaign Spreading Via WhatsApp Features Multi-Vector Persistence and Sophisticated C&C

Active Water Saci Campaign Spreading Via WhatsApp Features Multi-Vector Persistence and Sophisticated C&C 2025-10-28 at 07:12 By Continuous investigation on the Water Saci campaign reveals innovative email-based C&C system, multi-vector persistence, and real-time command capabilities that allow attackers to orchestrate coordinated botnet operations, gather detailed campaign intelligence, and dynamically control malware activity across multiple infected

React to this headline:

Loading spinner

Active Water Saci Campaign Spreading Via WhatsApp Features Multi-Vector Persistence and Sophisticated C&C Read More »

Agenda Ransomware Deploys Linux Variant on Windows Systems Through Remote Management Tools and BYOVD Techniques

Agenda Ransomware Deploys Linux Variant on Windows Systems Through Remote Management Tools and BYOVD Techniques 2025-10-23 at 21:13 By Trend™ Research identified a sophisticated Agenda ransomware attack that deployed a Linux variant on Windows systems. This cross-platform execution can make detection challenging for enterprises. This article is an excerpt from Trend Micro Research, News and

React to this headline:

Loading spinner

Agenda Ransomware Deploys Linux Variant on Windows Systems Through Remote Management Tools and BYOVD Techniques Read More »

Fast, Broad, and Elusive: How Vidar Stealer 2.0 Upgrades Infostealer Capabilities

Fast, Broad, and Elusive: How Vidar Stealer 2.0 Upgrades Infostealer Capabilities 2025-10-22 at 01:10 By Trend Research examines the latest version of the Vidar stealer, which features a full rewrite in C, a multithreaded architecture, and several enhancements that warrant attention. Its timely evolution suggests that Vidar is positioning itself to occupy the space left

React to this headline:

Loading spinner

Fast, Broad, and Elusive: How Vidar Stealer 2.0 Upgrades Infostealer Capabilities Read More »

Shifts in the Underground: The Impact of Water Kurita’s (Lumma Stealer) Doxxing

Shifts in the Underground: The Impact of Water Kurita’s (Lumma Stealer) Doxxing 2025-10-16 at 17:45 By A targeted underground doxxing campaign exposed alleged core members of Lumma Stealer (Water Kurita), resulting in a sharp decline in its activity and a migration of customers to rival infostealer platforms. This article is an excerpt from Trend Micro

React to this headline:

Loading spinner

Shifts in the Underground: The Impact of Water Kurita’s (Lumma Stealer) Doxxing Read More »

Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits

Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits 2025-10-15 at 23:22 By Trend™ Research has uncovered an attack campaign exploiting the Cisco SNMP vulnerability CVE-2025-20352, allowing remote code execution and rootkit deployment on unprotected devices, with impacts observed on Cisco 9400, 9300, and legacy 3750G series. This article is an excerpt from

React to this headline:

Loading spinner

Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits Read More »

Trend Micro launches new integration with Zscaler to deliver real-time, Risk-Based Zero Trust Access

Trend Micro launches new integration with Zscaler to deliver real-time, Risk-Based Zero Trust Access 2025-10-15 at 02:22 By Discover how Trend Vision One™ integrates with Zscaler to unify detection and access enforcement, accelerate threat containment, reduce dwell time, and deliver seamless Zero Trust protection for modern enterprises. This article is an excerpt from Trend Micro

React to this headline:

Loading spinner

Trend Micro launches new integration with Zscaler to deliver real-time, Risk-Based Zero Trust Access Read More »

Weaponized AI Assistants & Credential Thieves

Weaponized AI Assistants & Credential Thieves 2025-10-09 at 15:01 By Learn the state of AI and the NPM ecosystem with the recent s1ngularity’ weaponized AI for credential theft. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Weaponized AI Assistants & Credential Thieves Read More »

RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits

RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits 2025-10-09 at 15:01 By Trend™ Research and ZDI Threat Hunters have identified a large-scale RondoDox botnet campaign exploiting over 50 vulnerabilities across more than 30 vendors, including flaws first seen in Pwn2Own contests. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits Read More »

How Your AI Chatbot Can Become a Backdoor

How Your AI Chatbot Can Become a Backdoor 2025-10-08 at 17:54 By In this post of THE AI BREACH, learn how your Chatbot can become a backdoor. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

How Your AI Chatbot Can Become a Backdoor Read More »

CNAPP is the Solution to Multi-cloud Flexibility

CNAPP is the Solution to Multi-cloud Flexibility 2025-09-26 at 19:01 By Cloud-native application protection platform (CNAPP) not only helps organizations protect, but offers the flexibility of multi-cloud. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

CNAPP is the Solution to Multi-cloud Flexibility Read More »

This Is How Your LLM Gets Compromised

This Is How Your LLM Gets Compromised 2025-09-24 at 22:27 By Poisoned data. Malicious LoRAs. Trojan model files. AI attacks are stealthier than ever—often invisible until it’s too late. Here’s how to catch them before they catch you. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

This Is How Your LLM Gets Compromised Read More »

AI-Powered App Exposes User Data, Creates Risk of Supply Chain Attacks

AI-Powered App Exposes User Data, Creates Risk of Supply Chain Attacks 2025-09-24 at 01:02 By Trend™ Research’s analysis of Wondershare RepairIt reveals how the AI-driven app exposed sensitive user data due to unsecure cloud storage practices and hardcoded credentials, creating risks of model tampering and supply chain attacks. This article is an excerpt from Trend

React to this headline:

Loading spinner

AI-Powered App Exposes User Data, Creates Risk of Supply Chain Attacks Read More »

How AI-Native Development Platforms Enable Fake Captcha Pages

How AI-Native Development Platforms Enable Fake Captcha Pages 2025-09-19 at 11:45 By Cybercriminals are abusing AI-native platforms like Vercel, Netlify, and Lovable to host fake captcha pages that deceive users, bypass detection, and drive phishing campaigns. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

How AI-Native Development Platforms Enable Fake Captcha Pages Read More »

What We Know About the NPM Supply Chain Attack

What We Know About the NPM Supply Chain Attack 2025-09-18 at 13:34 By Trend™ Research outlines the critical details behind the ongoing NPM supply chain attack and offers essential steps to stay protected against potential compromise. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

What We Know About the NPM Supply Chain Attack Read More »

What’s Your Cybersecurity Maturity?

What’s Your Cybersecurity Maturity? 2025-09-10 at 10:53 By This blog post looks at four key milestones along the cybersecurity maturity journey and poses some questions you can ask to determine the stage of your organization’s progress. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

What’s Your Cybersecurity Maturity? Read More »

Unmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed

Unmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed 2025-09-09 at 13:08 By An analysis of the Gentlemen ransomware group, which employs advanced, adaptive tactics, techniques, and procedure to target critical industries worldwide. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Unmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed Read More »

Scroll to Top