Trend Micro Research : Artificial Intelligence (AI)

This Is How Your LLM Gets Compromised

This Is How Your LLM Gets Compromised 2025-09-24 at 22:27 By Poisoned data. Malicious LoRAs. Trojan model files. AI attacks are stealthier than ever—often invisible until it’s too late. Here’s how to catch them before they catch you. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to […]

React to this headline:

Loading spinner

This Is How Your LLM Gets Compromised Read More »

AI-Powered App Exposes User Data, Creates Risk of Supply Chain Attacks

AI-Powered App Exposes User Data, Creates Risk of Supply Chain Attacks 2025-09-24 at 01:02 By Trend™ Research’s analysis of Wondershare RepairIt reveals how the AI-driven app exposed sensitive user data due to unsecure cloud storage practices and hardcoded credentials, creating risks of model tampering and supply chain attacks. This article is an excerpt from Trend

React to this headline:

Loading spinner

AI-Powered App Exposes User Data, Creates Risk of Supply Chain Attacks Read More »

How AI-Native Development Platforms Enable Fake Captcha Pages

How AI-Native Development Platforms Enable Fake Captcha Pages 2025-09-19 at 11:45 By Cybercriminals are abusing AI-native platforms like Vercel, Netlify, and Lovable to host fake captcha pages that deceive users, bypass detection, and drive phishing campaigns. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

How AI-Native Development Platforms Enable Fake Captcha Pages Read More »

EvilAI Operators Use AI-Generated Code and Fake Apps for Far-Reaching Attacks

EvilAI Operators Use AI-Generated Code and Fake Apps for Far-Reaching Attacks 2025-09-12 at 06:16 By Combining AI-generated code and social engineering, EvilAI operators are executing a rapidly expanding campaign, disguising their malware as legitimate applications to bypass security, steal credentials, and persistently compromise organizations worldwide. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

EvilAI Operators Use AI-Generated Code and Fake Apps for Far-Reaching Attacks Read More »

Leadership, Innovation, and the Future of AI: Lessons from Trend Micro CEO & Co-Founder Eva Chen

Leadership, Innovation, and the Future of AI: Lessons from Trend Micro CEO & Co-Founder Eva Chen 2025-08-23 at 04:02 By Discover how AI is reshaping cybersecurity through our CEO, Eva Chen’s industry briefing series. Gain practical strategies, real-world insights, and a clear roadmap to secure your AI initiatives with confidence. This article is an excerpt

React to this headline:

Loading spinner

Leadership, Innovation, and the Future of AI: Lessons from Trend Micro CEO & Co-Founder Eva Chen Read More »

Proactive Email Security: The Power of AI

Proactive Email Security: The Power of AI 2025-07-25 at 01:27 By Lead with AI-powered email security to stay ahead of attackers and personalize user interaction at every touchpoint, bridging technology and behavior with precision. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Proactive Email Security: The Power of AI Read More »

Preventing Zero-Click AI Threats: Insights from EchoLeak

Preventing Zero-Click AI Threats: Insights from EchoLeak 2025-07-15 at 13:04 By A zero-click exploit called EchoLeak reveals how AI assistants like Microsoft 365 Copilot can be manipulated to leak sensitive data without user interaction. This entry breaks down how the attack works, why it matters, and what defenses are available to proactively mitigate this emerging

React to this headline:

Loading spinner

Preventing Zero-Click AI Threats: Insights from EchoLeak Read More »

AI Dilemma: Emerging Tech as Cyber Risk Escalates

AI Dilemma: Emerging Tech as Cyber Risk Escalates 2025-07-04 at 07:17 By As AI adoption accelerates, businesses face mounting cyber threats—and urgent choices about secure implementation This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

AI Dilemma: Emerging Tech as Cyber Risk Escalates Read More »

Why Trend Micro Continues to be Named a CNAPP Leader

Why Trend Micro Continues to be Named a CNAPP Leader 2025-06-28 at 01:01 By Trend Micro is recognized for our Cloud CNAPP capabilities and product strategy—affirming our vision to deliver a cloud security solution that predicts, protects, and responds to threats across hybrid and multi-cloud environments. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

Why Trend Micro Continues to be Named a CNAPP Leader Read More »

Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI Agent

Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI Agent 2025-06-24 at 16:47 By A single SQL injection bug in Anthropic’s SQLite MCP server—forked over 5,000 times—can seed stored prompts, exfiltrate data, and hand attackers the keys to entire agent workflows. This entry unpacks the attack chain and lays out concrete fixes to

React to this headline:

Loading spinner

Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI Agent Read More »

Enabling Secure AI Inference: Trend Cybertron Leverages NVIDIA Universal LLM NIM Microservices

Enabling Secure AI Inference: Trend Cybertron Leverages NVIDIA Universal LLM NIM Microservices 2025-06-11 at 15:05 By Learn how Trend’s Cybertron has been harnessing the power of NVIDIA Universal LLM NIM Microservices. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Enabling Secure AI Inference: Trend Cybertron Leverages NVIDIA Universal LLM NIM Microservices Read More »

Keeping Pace and Embracing Emerging Technologies

Keeping Pace and Embracing Emerging Technologies 2025-06-10 at 23:47 By Trend Micro and the NEOM McLaren Formula E Team stay ahead of the curve by embracing new technologies, fostering a no-blame culture, and making split-second decisions in high-stakes environments. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

Keeping Pace and Embracing Emerging Technologies Read More »

NEOM McLaren Formula E Team & Trend Micro Innovation History

NEOM McLaren Formula E Team & Trend Micro Innovation History 2025-06-06 at 17:48 By Explore how innovation becomes a team sport when Trend Micro and the NEOM McLaren Formula E Team leaders come together to talk culture, risk, and forward thinking. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

NEOM McLaren Formula E Team & Trend Micro Innovation History Read More »

Driving Success on the Track or in the Boardroom

Driving Success on the Track or in the Boardroom 2025-06-05 at 13:37 By Discover how the Trend Micro and the NEOM McLaren Formula E Team partnership is powered by a common vision for winning, on the track and in the boardroom. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

Driving Success on the Track or in the Boardroom Read More »

Trend Joins NVIDIA to Secure AI Infrastructure with NVIDIA

Trend Joins NVIDIA to Secure AI Infrastructure with NVIDIA 2025-05-19 at 06:03 By Together, we are focused on securing the full AI lifecycle—from development and training to deployment and inference—across cloud, data center, and AI factories. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Trend Joins NVIDIA to Secure AI Infrastructure with NVIDIA Read More »

Exploring PLeak: An Algorithmic Method for System Prompt Leakage

Exploring PLeak: An Algorithmic Method for System Prompt Leakage 2025-05-01 at 12:03 By What is PLeak, and what are the risks associated with it? We explored this algorithmic technique and how it can be used to jailbreak LLMs, which could be leveraged by threat actors to manipulate systems and steal sensitive data. This article is

React to this headline:

Loading spinner

Exploring PLeak: An Algorithmic Method for System Prompt Leakage Read More »

GTC 2025: AI, Security & The New Blueprint

GTC 2025: AI, Security & The New Blueprint 2025-04-08 at 03:31 By From quantum leaps to AI factories, GTC 2025 proved one thing: the future runs on secure foundations. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

GTC 2025: AI, Security & The New Blueprint Read More »

Capacity is Critical in Riskier Threat Landscape

Capacity is Critical in Riskier Threat Landscape 2025-04-04 at 10:32 By International cooperation, reporting, and capacity building are critical to enhance cybersecurity defenses. Effective governance in an increasingly risky landscape requires visibility as well as coordinated vulnerability disclosure. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

Capacity is Critical in Riskier Threat Landscape Read More »

Exploiting DeepSeek-R1: Breaking Down Chain of Thought Security

Exploiting DeepSeek-R1: Breaking Down Chain of Thought Security 2025-03-04 at 16:00 By This entry explores how the Chain of Thought reasoning in the DeepSeek-R1 AI model can be susceptible to prompt attacks, insecure output generation, and sensitive data theft. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

Exploiting DeepSeek-R1: Breaking Down Chain of Thought Security Read More »

Invisible Prompt Injection: A Threat to AI Security

Invisible Prompt Injection: A Threat to AI Security 2025-01-23 at 00:07 By This article explains the invisible prompt injection, including how it works, an attack scenario, and how users can protect themselves. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Invisible Prompt Injection: A Threat to AI Security Read More »

Scroll to Top