Trend Micro Research : Articles, News, Reports

A SANS’s 2024 Threat-Hunting Survey Review

A SANS’s 2024 Threat-Hunting Survey Review 2024-06-05 at 00:16 By In its ninth year, the annual SANS Threat Hunting Survey delves into global organizational practices in threat hunting, shedding light on the challenges and adaptations in the landscape over the past year. This article is an excerpt from Trend Micro Research, News and Perspectives View […]

React to this headline:

Loading spinner

A SANS’s 2024 Threat-Hunting Survey Review Read More »

It’s Time to Up-Level Your EDR Solution

It’s Time to Up-Level Your EDR Solution 2024-06-03 at 18:01 By You may have EDR, but did you know you can add threat detection and response to improve a SecOps team’s efficiency and outcomes – read more. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this

React to this headline:

Loading spinner

It’s Time to Up-Level Your EDR Solution Read More »

Explore AI-Driven Cybersecurity with Trend Micro, Using NVIDIA NIM

Explore AI-Driven Cybersecurity with Trend Micro, Using NVIDIA NIM 2024-06-03 at 00:31 By Discover Trend Micro’s integration of NVIDIA NIM to deliver an AI-driven cybersecurity solution for next-generation data centers. Engage with experts, explore demos, and learn strategies for securing AI data centers and optimizing cloud performance. This article is an excerpt from Trend Micro

React to this headline:

Loading spinner

Explore AI-Driven Cybersecurity with Trend Micro, Using NVIDIA NIM Read More »

Decoding Water Sigbin’s Latest Obfuscation Tricks

Decoding Water Sigbin’s Latest Obfuscation Tricks 2024-05-30 at 08:09 By Water Sigbin (aka the 8220 Gang) exploited the Oracle WebLogic vulnerabilities CVE-2017-3506 and CVE-2023-21839 to deploy a cryptocurrency miner using a PowerShell script. The threat actor also adopted new techniques to conceal its activities, making attacks harder to defend against. This article is an excerpt

React to this headline:

Loading spinner

Decoding Water Sigbin’s Latest Obfuscation Tricks Read More »

2 Weeks Out: Evolution at RSAC 2024

2 Weeks Out: Evolution at RSAC 2024 2024-05-29 at 01:31 By Discover the latest innovations in cyber defense and Trend’s expert insights on AI, data security, and emerging threats This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

2 Weeks Out: Evolution at RSAC 2024 Read More »

ISPM & ITDR Synergize for AI-Based Identity Security

ISPM & ITDR Synergize for AI-Based Identity Security 2024-05-22 at 23:31 By In the ever-evolving landscape of cybersecurity, staying ahead of malicious actors requires a multifaceted approach. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

ISPM & ITDR Synergize for AI-Based Identity Security Read More »

Tracking the Progression of Earth Hundun’s Cyberespionage Campaign in 2024

Tracking the Progression of Earth Hundun’s Cyberespionage Campaign in 2024 2024-05-16 at 10:46 By This report describes how Waterbear and Deuterbear — two of the tools in Earth Hundun’s arsenal — operate, based on a campaign from 2024. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

Tracking the Progression of Earth Hundun’s Cyberespionage Campaign in 2024 Read More »

Deepfakes and AI-Driven Disinformation Threaten Polls

Deepfakes and AI-Driven Disinformation Threaten Polls 2024-05-02 at 14:16 By Cheap and easy access to AI makes it harder to detect state-sponsored and homegrown campaigns during this election year This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Deepfakes and AI-Driven Disinformation Threaten Polls Read More »

Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks

Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks 2024-05-01 at 12:16 By This blog entry aims to highlight the dangers of internet-facing routers and elaborate on Pawn Storm’s exploitation of EdgeRouters, complementing the FBI’s advisory from February 27, 2024. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks Read More »

The Fall of LabHost: Law Enforcement Shuts Down Phishing Service Provider

The Fall of LabHost: Law Enforcement Shuts Down Phishing Service Provider 2024-04-18 at 04:16 By On April 18, 2024, the UK’s Metropolitan Police Service and others conducted an operation that succeeded in taking down the Phishing-as-a-Service provider LabHost. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

The Fall of LabHost: Law Enforcement Shuts Down Phishing Service Provider Read More »

Cybersecurity Decluttered: A Journey to Consolidation

Cybersecurity Decluttered: A Journey to Consolidation 2024-04-12 at 20:46 By Learn how far cybersecurity has come from scattered resources to consolidation the future. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Cybersecurity Decluttered: A Journey to Consolidation Read More »

Cyberespionage Group Earth Hundun’s Continuous Refinement of Waterbear and Deuterbear

Cyberespionage Group Earth Hundun’s Continuous Refinement of Waterbear and Deuterbear 2024-04-11 at 13:16 By Our blog entry provides an in-depth analysis of Earth Hundun’s Waterbear and Deuterbear malware. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Cyberespionage Group Earth Hundun’s Continuous Refinement of Waterbear and Deuterbear Read More »

Unveiling the Fallout: Operation Cronos’ Impact on LockBit Following Landmark Disruption

Unveiling the Fallout: Operation Cronos’ Impact on LockBit Following Landmark Disruption 2024-04-03 at 14:31 By Our new article provides key highlights and takeaways from Operation Cronos’ disruption of LockBit’s operations, as well as telemetry details on how LockBit actors operated post-disruption. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

Unveiling the Fallout: Operation Cronos’ Impact on LockBit Following Landmark Disruption Read More »

Earth Freybug Uses UNAPIMON for Unhooking Critical APIs

Earth Freybug Uses UNAPIMON for Unhooking Critical APIs 2024-04-02 at 09:01 By This article provides an in-depth look into two techniques used by Earth Freybug actors: dynamic-link library (DLL) hijacking and application programming interface (API) unhooking to prevent child processes from being monitored via a new malware we’ve discovered and dubbed UNAPIMON. This article is

React to this headline:

Loading spinner

Earth Freybug Uses UNAPIMON for Unhooking Critical APIs Read More »

Agenda Ransomware Propagates to vCenters and ESXi via Custom PowerShell Script

Agenda Ransomware Propagates to vCenters and ESXi via Custom PowerShell Script 2024-03-26 at 10:31 By This blog entry discusses the Agenda ransomware group’s use of its latest Rust variant to propagate to VMWare vCenter and ESXi servers. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this

React to this headline:

Loading spinner

Agenda Ransomware Propagates to vCenters and ESXi via Custom PowerShell Script Read More »

NIST Launches Cybersecurity Framework (CSF) 2.0

NIST Launches Cybersecurity Framework (CSF) 2.0 2024-03-20 at 07:46 By On February 26, 2024, the National Institute of Standards and Technology (NIST) released the official 2.0 version of the Cyber Security Framework (CSF). This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

NIST Launches Cybersecurity Framework (CSF) 2.0 Read More »

Jenkins Args4j CVE-2024-23897: Files Exposed, Code at Risk

Jenkins Args4j CVE-2024-23897: Files Exposed, Code at Risk 2024-03-19 at 10:04 By Jenkins, a popular open-source automation server, was discovered to be affected by a file read vulnerability, CVE-2024-23897. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Jenkins Args4j CVE-2024-23897: Files Exposed, Code at Risk Read More »

Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks

Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks 2024-03-18 at 12:02 By Since early 2022, we have been monitoring an APT campaign that targets several government entities worldwide, with a strong focus in Southeast Asia, but also seen targeting Europe, America, and Africa. This article is an excerpt from Trend Micro Research, News and

React to this headline:

Loading spinner

Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks Read More »

A Necessary Digital Odyssey of RPA and AI/ML at HUD

A Necessary Digital Odyssey of RPA and AI/ML at HUD 2024-03-13 at 05:57 By Explore two RPA and AI/ML use cases at HUD during the operational challenges of the longest US Government shutdown, a rigid legacy IT environment, and complex federal regulations. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

A Necessary Digital Odyssey of RPA and AI/ML at HUD Read More »

AI Auctions: Collectibles, Taylor Swift, Jordan Bots

AI Auctions: Collectibles, Taylor Swift, Jordan Bots 2024-03-06 at 06:48 By Discover the fascinating world of AI, ML, and RPA and their real-world applications including the creation of a custom RPA bot for collecting rare sports memorabilia. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this

React to this headline:

Loading spinner

AI Auctions: Collectibles, Taylor Swift, Jordan Bots Read More »

Scroll to Top