Trend Micro Research : Articles, News, Reports

Enabling Secure AI Inference: Trend Cybertron Leverages NVIDIA Universal LLM NIM Microservices

Enabling Secure AI Inference: Trend Cybertron Leverages NVIDIA Universal LLM NIM Microservices 2025-06-11 at 15:05 By Learn how Trend’s Cybertron has been harnessing the power of NVIDIA Universal LLM NIM Microservices. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Enabling Secure AI Inference: Trend Cybertron Leverages NVIDIA Universal LLM NIM Microservices Read More »

Earth Lamia Develops Custom Arsenal to Target Multiple Industries

Earth Lamia Develops Custom Arsenal to Target Multiple Industries 2025-05-27 at 12:02 By Trend™ Research has been tracking an active APT threat actor named Earth Lamia, targeting multiple industries in Brazil, India and Southeast Asia countries at least since 2023. The threat actor primarily exploits vulnerabilities in web applications to gain access to targeted organizations.

React to this headline:

Loading spinner

Earth Lamia Develops Custom Arsenal to Target Multiple Industries Read More »

Fake CAPTCHA Attacks Deploy Infostealers and RATs in a Multistage Payload Chain

Fake CAPTCHA Attacks Deploy Infostealers and RATs in a Multistage Payload Chain 2025-05-22 at 12:23 By We have detected a new tactic involving fake CAPTCHA pages that trick users into executing harmful commands in Windows. This scheme uses disguised files sent via phishing and other malicious methods. This article is an excerpt from Trend Micro

React to this headline:

Loading spinner

Fake CAPTCHA Attacks Deploy Infostealers and RATs in a Multistage Payload Chain Read More »

Trend Joins NVIDIA to Secure AI Infrastructure with NVIDIA

Trend Joins NVIDIA to Secure AI Infrastructure with NVIDIA 2025-05-19 at 06:03 By Together, we are focused on securing the full AI lifecycle—from development and training to deployment and inference—across cloud, data center, and AI factories. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Trend Joins NVIDIA to Secure AI Infrastructure with NVIDIA Read More »

Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan

Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan 2025-05-13 at 10:16 By Trend™ Research discusses the evolving tradecraft of threat actor Earth Ammit, proven by the advanced toolset used in its TIDRONE and VENOM campaigns that targeted the drone supply chain. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan Read More »

Agenda Ransomware Group Adds SmokeLoader and NETXLOADER to Their Arsenal

Agenda Ransomware Group Adds SmokeLoader and NETXLOADER to Their Arsenal 2025-05-07 at 11:48 By During our monitoring of Agenda ransomware activities, we uncovered campaigns that made use of the SmokeLoader malware and a new loader we’ve named NETXLOADER. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

Agenda Ransomware Group Adds SmokeLoader and NETXLOADER to Their Arsenal Read More »

Exploring PLeak: An Algorithmic Method for System Prompt Leakage

Exploring PLeak: An Algorithmic Method for System Prompt Leakage 2025-05-01 at 12:03 By What is PLeak, and what are the risks associated with it? We explored this algorithmic technique and how it can be used to jailbreak LLMs, which could be leveraged by threat actors to manipulate systems and steal sensitive data. This article is

React to this headline:

Loading spinner

Exploring PLeak: An Algorithmic Method for System Prompt Leakage Read More »

Earth Kasha Updates TTPs in Latest Campaign Targeting Taiwan and Japan

Earth Kasha Updates TTPs in Latest Campaign Targeting Taiwan and Japan 2025-04-30 at 12:02 By This blog discusses the latest modifications observed in Earth Kasha’s TTPs from their latest campaign detected in March 2025 targeting Taiwan and Japan. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

Earth Kasha Updates TTPs in Latest Campaign Targeting Taiwan and Japan Read More »

NVIDIA Riva Vulnerabilities Leave AI-Powered Speech and Translation Services at Risk

NVIDIA Riva Vulnerabilities Leave AI-Powered Speech and Translation Services at Risk 2025-04-28 at 11:46 By Trend Research uncovered misconfigurations in NVIDIA Riva deployments, with two vulnerabilities, CVE-2025-23242 and CVE-2025-23243, contributing to their exposure. These security flaws could lead to unauthorized access, resource abuse, and potential misuse or theft of AI-powered inference services, including speech recognition

React to this headline:

Loading spinner

NVIDIA Riva Vulnerabilities Leave AI-Powered Speech and Translation Services at Risk Read More »

Earth Kurma APT Campaign Targets Southeast Asian Government, Telecom Sectors

Earth Kurma APT Campaign Targets Southeast Asian Government, Telecom Sectors 2025-04-25 at 11:22 By An APT group dubbed Earth Kurma is actively targeting government and telecommunications organizations in Southeast Asia using advanced malware, rootkits, and trusted cloud services to conduct cyberespionage. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

Earth Kurma APT Campaign Targets Southeast Asian Government, Telecom Sectors Read More »

Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations

Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations 2025-04-24 at 05:08 By In this blog entry, we discuss how North Korea’s significant role in cybercrime – including campaigns attributed to Void Dokkaebi – is facilitated by extensive use of anonymization networks and the use of Russian IP ranges. This article is an excerpt

React to this headline:

Loading spinner

Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations Read More »

FOG Ransomware Spread by Cybercriminals Claiming Ties to DOGE

FOG Ransomware Spread by Cybercriminals Claiming Ties to DOGE 2025-04-21 at 05:11 By This blog details our investigation of malware samples that conceal within them a FOG ransomware payload. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

FOG Ransomware Spread by Cybercriminals Claiming Ties to DOGE Read More »

CrazyHunter Campaign Targets Taiwanese Critical Sectors

CrazyHunter Campaign Targets Taiwanese Critical Sectors 2025-04-16 at 11:55 By This blog entry details research on emerging ransomware group CrazyHunter, which has launched a sophisticated campaign aimed at Taiwan’s essential services. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

CrazyHunter Campaign Targets Taiwanese Critical Sectors Read More »

ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains

ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains 2025-04-15 at 13:47 By In ZDI-23-1527 and ZDI-23-1528 we uncover two possible scenarios where attackers could have compromised the Microsoft PC Manager supply chain. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains Read More »

BPFDoor’s Hidden Controller Used Against Asia, Middle East Targets

BPFDoor’s Hidden Controller Used Against Asia, Middle East Targets 2025-04-14 at 14:12 By A controller linked to BPF backdoor can open a reverse shell, enabling deeper infiltration into compromised networks. Recent attacks have been observed targeting the telecommunications, finance, and retail sectors across South Korea, Hong Kong, Myanmar, Malaysia, and Egypt. This article is an

React to this headline:

Loading spinner

BPFDoor’s Hidden Controller Used Against Asia, Middle East Targets Read More »

Incomplete NVIDIA Patch to CVE-2024-0132 Exposes AI Infrastructure and Data to Critical Risks

Incomplete NVIDIA Patch to CVE-2024-0132 Exposes AI Infrastructure and Data to Critical Risks 2025-04-10 at 12:16 By A previously disclosed vulnerability in NVIDIA Container Toolkit has an incomplete patch, which, if exploited, could put a wide range of AI infrastructure and sensitive data at risk. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

Incomplete NVIDIA Patch to CVE-2024-0132 Exposes AI Infrastructure and Data to Critical Risks Read More »

CTEM + CREM: Aligning Your Cybersecurity Strategy

CTEM + CREM: Aligning Your Cybersecurity Strategy 2025-04-09 at 05:41 By Cyber threats evolve daily, and organizations need to move beyond traditional security approaches to stay ahead. That’s why Continuous Threat Exposure Management (CTEM), a concept introduced by Gartner, has been gaining traction. CTEM isn’t just another cybersecurity buzzword; it’s a structured, continuous program designed

React to this headline:

Loading spinner

CTEM + CREM: Aligning Your Cybersecurity Strategy Read More »

GTC 2025: AI, Security & The New Blueprint

GTC 2025: AI, Security & The New Blueprint 2025-04-08 at 03:31 By From quantum leaps to AI factories, GTC 2025 proved one thing: the future runs on secure foundations. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

GTC 2025: AI, Security & The New Blueprint Read More »

Capacity is Critical in Riskier Threat Landscape

Capacity is Critical in Riskier Threat Landscape 2025-04-04 at 10:32 By International cooperation, reporting, and capacity building are critical to enhance cybersecurity defenses. Effective governance in an increasingly risky landscape requires visibility as well as coordinated vulnerability disclosure. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

Capacity is Critical in Riskier Threat Landscape Read More »

The Espionage Toolkit of Earth Alux: A Closer Look at its Advanced Techniques

The Espionage Toolkit of Earth Alux: A Closer Look at its Advanced Techniques 2025-03-31 at 12:23 By The cyberespionage techniques of Earth Alux, a China-linked APT group, are putting critical industries at risk. The attacks, aimed at the APAC and Latin American regions, leverage powerful tools and techniques to remain hidden while stealing sensitive data.

React to this headline:

Loading spinner

The Espionage Toolkit of Earth Alux: A Closer Look at its Advanced Techniques Read More »

Scroll to Top