Trend Micro Research : Articles, News, Reports

Native Sensors vs. Integrations for XDR Platforms?

Native Sensors vs. Integrations for XDR Platforms? 2025-02-03 at 09:20 By Native sensors vs. integrations in XDR: Native sensors offer faster deployment, real-time detection, and deeper visibility, while integrations may add complexity and delays. Learn how to optimize your XDR strategy for improved security. This article is an excerpt from Trend Micro Research, News and […]

React to this headline:

Loading spinner

Native Sensors vs. Integrations for XDR Platforms? Read More »

Future of Cybersecurity: Will XDR Absorb SIEM & SOAR?

Future of Cybersecurity: Will XDR Absorb SIEM & SOAR? 2025-01-31 at 22:20 By XDR is reshaping cybersecurity by unifying and enhancing SIEM and SOAR capabilities into a single platform. It addresses alert fatigue, improves incident correlation, simplifies operations, and enhances efficiency for SOC teams. This article is an excerpt from Trend Micro Research, News and

React to this headline:

Loading spinner

Future of Cybersecurity: Will XDR Absorb SIEM & SOAR? Read More »

Lumma Stealer’s GitHub-Based Delivery Explored via Managed Detection and Response

Lumma Stealer’s GitHub-Based Delivery Explored via Managed Detection and Response 2025-01-30 at 10:18 By The Managed XDR team investigated a sophisticated campaign distributing Lumma Stealer through GitHub, where attackers leveraged the platform’s release infrastructure to deliver malware such as SectopRAT, Vidar, and Cobeacon. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

Lumma Stealer’s GitHub-Based Delivery Explored via Managed Detection and Response Read More »

ASRM: A New Pillar for Cyber Insurance Underwriting

ASRM: A New Pillar for Cyber Insurance Underwriting 2025-01-30 at 02:33 By ASRM transforms cyber insurance underwriting by integrating real-time risk assessments, advanced tools (NDR, EDR, Cloud Security, MDR), and proactive mitigation strategies to improve accuracy, reduce claims, and build trust. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

ASRM: A New Pillar for Cyber Insurance Underwriting Read More »

Trend Micro and CISA Secure-By-Design Pledge

Trend Micro and CISA Secure-By-Design Pledge 2025-01-24 at 01:46 By Trend’s support reaffirms dedication to safeguarding products and customers This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Trend Micro and CISA Secure-By-Design Pledge Read More »

Invisible Prompt Injection: A Threat to AI Security

Invisible Prompt Injection: A Threat to AI Security 2025-01-23 at 00:07 By This article explains the invisible prompt injection, including how it works, an attack scenario, and how users can protect themselves. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Invisible Prompt Injection: A Threat to AI Security Read More »

IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024

IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024 2025-01-17 at 11:19 By Since the end of 2024, we have been continuously monitoring large-scale DDoS attacks orchestrated by an IoT botnet exploiting vulnerable IoT devices such as wireless routers and IP cameras. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024 Read More »

How Cracks and Installers Bring Malware to Your Device

How Cracks and Installers Bring Malware to Your Device 2025-01-10 at 09:35 By Our research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

How Cracks and Installers Bring Malware to Your Device Read More »

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit 2025-01-09 at 09:17 By Our blog entry discusses a fake PoC exploit for LDAPNightmare (CVE-2024-49113) that is being used to distribute information-stealing malware. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit Read More »

Trend Micro Contributes and Maps Container Security to MITRE ATT&CK: A Game-Changer for Cyber Defense

Trend Micro Contributes and Maps Container Security to MITRE ATT&CK: A Game-Changer for Cyber Defense 2025-01-07 at 18:01 By Trend Micro leads the way by mapping its Container Security detection capabilities to the MITRE ATT&CK framework for Containers and contributing real-world attack data. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

Trend Micro Contributes and Maps Container Security to MITRE ATT&CK: A Game-Changer for Cyber Defense Read More »

AI Pulse: Top AI Trends from 2024 – A Look Back

AI Pulse: Top AI Trends from 2024 – A Look Back 2025-01-03 at 22:18 By In this edition of AI Pulse, let’s look back at top AI trends from 2024 in the rear view so we can more clearly predicts AI trends for 2025 and beyond. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

AI Pulse: Top AI Trends from 2024 – A Look Back Read More »

Python-Based NodeStealer Version Targets Facebook Ads Manager

Python-Based NodeStealer Version Targets Facebook Ads Manager 2024-12-19 at 09:46 By In this blog entry, Trend Micro’s Managed XDR team discuss their investigation into how the latest variant of NodeStealer is delivered through spear-phishing attacks, potentially leading to malware execution, data theft, and the exfiltration of sensitive information via Telegram. This article is an excerpt

React to this headline:

Loading spinner

Python-Based NodeStealer Version Targets Facebook Ads Manager Read More »

Link Trap: GenAI Prompt Injection Attack

Link Trap: GenAI Prompt Injection Attack 2024-12-17 at 03:20 By Prompt injection exploits vulnerabilities in generative AI to manipulate its behavior, even without extensive permissions. This attack can expose sensitive data, making awareness and preventive measures essential. Learn how it works and how to stay protected. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

Link Trap: GenAI Prompt Injection Attack Read More »

MITRE ATT&CK 2024 Results for Enterprise Security

MITRE ATT&CK 2024 Results for Enterprise Security 2024-12-11 at 19:18 By Enterprise 2024 will incorporate multiple, smaller emulations for a more nuanced and targeted evaluation of defensive capabilities. We’re excited to offer two distinct adversary focus areas: Ransomware targeting Windows and Linux, and the Democratic People’s Republic of Korea’s targeting macOS. This article is an

React to this headline:

Loading spinner

MITRE ATT&CK 2024 Results for Enterprise Security Read More »

MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks

MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks 2024-12-05 at 09:33 By Trend Micro’s monitoring of the MOONSHINE exploit kit revealed how it’s used by the threat actor Earth Minotaur to exploit Android messaging app vulnerabilities and install the DarkNimbus backdoor for surveillance. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks Read More »

The Road to Agentic AI: Exposed Foundations

The Road to Agentic AI: Exposed Foundations 2024-12-04 at 17:18 By Our research into Retrieval Augmented Generation (RAG) systems uncovered at least 80 unprotected servers. We highlight this problem, which can lead to potential data loss and unauthorized access. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

The Road to Agentic AI: Exposed Foundations Read More »

Gafgyt Malware Targeting Docker Remote API Servers

Gafgyt Malware Targeting Docker Remote API Servers 2024-12-03 at 11:50 By Our researchers identified threat actors exploiting misconfigured Docker servers to spread the Gafgyt malware. This threat traditionally targets IoT devices; this new tactic signals a change in its behavior. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Gafgyt Malware Targeting Docker Remote API Servers Read More »

AI Pulse: The Good from AI and the Promise of Agentic

AI Pulse: The Good from AI and the Promise of Agentic 2024-12-03 at 03:54 By The perils of AI get a lot of airtime, but what are the upsides? This issue of AI Pulse looks at some of the good AI can bring, from strengthening cybersecurity to driving health breakthroughs—and how the coming wave of

React to this headline:

Loading spinner

AI Pulse: The Good from AI and the Promise of Agentic Read More »

Guess Who’s Back – The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024

Guess Who’s Back – The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024 2024-11-26 at 10:33 By Trend Micro has identified a spear-phishing campaign active in Japan since June 2024. Evidence about the malware used by this campaign suggests this was part of a new operation by Earth Kasha. This article

React to this headline:

Loading spinner

Guess Who’s Back – The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024 Read More »

Spot the Difference: Earth Kasha’s New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella

Spot the Difference: Earth Kasha’s New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella 2024-11-19 at 11:01 By LODEINFO is a malware used in attacks targeting mainly Japan since 2019. Trend Micro has been tracking the group as Earth Kasha. We have identified a new campaign connected to this group with significant updates

React to this headline:

Loading spinner

Spot the Difference: Earth Kasha’s New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella Read More »

Scroll to Top