Trend Micro Research : Cloud

How AI Goes Rogue

How AI Goes Rogue 2024-09-04 at 01:46 By This is the second blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

How AI Goes Rogue Read More »

Complete Guide to Protecting Seven Attack Vectors

Complete Guide to Protecting Seven Attack Vectors 2024-08-27 at 18:31 By The quicker a cyberattack is identified, the less it costs. Jon Clay, VP of Threat Intelligence, reviews seven key initial attack vectors and provides proactive security tips to help you reduce cyber risk across the attack surface. This article is an excerpt from Trend

React to this headline:

Loading spinner

Complete Guide to Protecting Seven Attack Vectors Read More »

Rogue AI is the Future of Cyber Threats

Rogue AI is the Future of Cyber Threats 2024-08-15 at 16:32 By This is the first blog in a series on Rogue AI. Later articles will include technical guidance, case studies and more. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Rogue AI is the Future of Cyber Threats Read More »

AI Pulse: Brazil Gets Bold with Meta, Interpol’s Red Flag & more

AI Pulse: Brazil Gets Bold with Meta, Interpol’s Red Flag & more 2024-07-30 at 22:17 By The second edition of AI Pulse is all about AI regulation: what’s coming, why it matters, and what might happen without it. We look at Brazil’s hard não to Meta, how communities are pushing back against AI training data

React to this headline:

Loading spinner

AI Pulse: Brazil Gets Bold with Meta, Interpol’s Red Flag & more Read More »

AI-Powered Deepfake Tools Becoming More Accessible Than Ever

AI-Powered Deepfake Tools Becoming More Accessible Than Ever 2024-07-30 at 22:17 By Trend Micro research uncovers new cybercrime tools posing increased threats to security, highlighting the rapid evolution of AI-powered hacking services and their potential for mass exploitation This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

AI-Powered Deepfake Tools Becoming More Accessible Than Ever Read More »

How to Write a Generative AI Cybersecurity Policy

How to Write a Generative AI Cybersecurity Policy 2024-07-29 at 13:01 By It’s clear that generative AI is a permanent addition to the enterprise IT toolbox. For CISOs, the pressure is on to roll out AI security policies and technologies that can mitigate very real and present risks. This article is an excerpt from Trend

React to this headline:

Loading spinner

How to Write a Generative AI Cybersecurity Policy Read More »

QR Codes: Convenience or Cyberthreat?

QR Codes: Convenience or Cyberthreat? 2024-07-23 at 20:16 By Security awareness and measures to detect and prevent sophisticated risks associated with QR code-based phishing attacks (quishing) This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

QR Codes: Convenience or Cyberthreat? Read More »

Examining Water Sigbin’s Infection Routine Leading to an XMRig Cryptominer

Examining Water Sigbin’s Infection Routine Leading to an XMRig Cryptominer 2024-06-28 at 08:31 By We analyze the multi-stage loading technique used by Water Sigbin to deliver the PureCrypter loader and XMRIG crypto miner. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Examining Water Sigbin’s Infection Routine Leading to an XMRig Cryptominer Read More »

Omdia Report: Trend Disclosed 60% of Vulnerabilities

Omdia Report: Trend Disclosed 60% of Vulnerabilities 2024-06-25 at 15:16 By The latest Omdia Vulnerability Report shows Trend MicroTM Zero Day InitiativeTM (ZDI) spearheaded 60% of 2023 disclosures, underscoring its role in cybersecurity threat prevention. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Omdia Report: Trend Disclosed 60% of Vulnerabilities Read More »

Commando Cat: A Novel Cryptojacking Attack Abusing Docker Remote API Servers

Commando Cat: A Novel Cryptojacking Attack Abusing Docker Remote API Servers 2024-06-06 at 11:01 By We analyze a cryptojacking attack campaign exploiting exposed Docker remote API servers to deploy cryptocurrency miners, using Docker images from the open-source Commando project. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

Commando Cat: A Novel Cryptojacking Attack Abusing Docker Remote API Servers Read More »

It’s Time to Up-Level Your EDR Solution

It’s Time to Up-Level Your EDR Solution 2024-06-03 at 18:01 By You may have EDR, but did you know you can add threat detection and response to improve a SecOps team’s efficiency and outcomes – read more. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this

React to this headline:

Loading spinner

It’s Time to Up-Level Your EDR Solution Read More »

Explore AI-Driven Cybersecurity with Trend Micro, Using NVIDIA NIM

Explore AI-Driven Cybersecurity with Trend Micro, Using NVIDIA NIM 2024-06-03 at 00:31 By Discover Trend Micro’s integration of NVIDIA NIM to deliver an AI-driven cybersecurity solution for next-generation data centers. Engage with experts, explore demos, and learn strategies for securing AI data centers and optimizing cloud performance. This article is an excerpt from Trend Micro

React to this headline:

Loading spinner

Explore AI-Driven Cybersecurity with Trend Micro, Using NVIDIA NIM Read More »

Decoding Water Sigbin’s Latest Obfuscation Tricks

Decoding Water Sigbin’s Latest Obfuscation Tricks 2024-05-30 at 08:09 By Water Sigbin (aka the 8220 Gang) exploited the Oracle WebLogic vulnerabilities CVE-2017-3506 and CVE-2023-21839 to deploy a cryptocurrency miner using a PowerShell script. The threat actor also adopted new techniques to conceal its activities, making attacks harder to defend against. This article is an excerpt

React to this headline:

Loading spinner

Decoding Water Sigbin’s Latest Obfuscation Tricks Read More »

2 Weeks Out: Evolution at RSAC 2024

2 Weeks Out: Evolution at RSAC 2024 2024-05-29 at 01:31 By Discover the latest innovations in cyber defense and Trend’s expert insights on AI, data security, and emerging threats This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

2 Weeks Out: Evolution at RSAC 2024 Read More »

Deepfakes and AI-Driven Disinformation Threaten Polls

Deepfakes and AI-Driven Disinformation Threaten Polls 2024-05-02 at 14:16 By Cheap and easy access to AI makes it harder to detect state-sponsored and homegrown campaigns during this election year This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Deepfakes and AI-Driven Disinformation Threaten Polls Read More »

Cybersecurity Decluttered: A Journey to Consolidation

Cybersecurity Decluttered: A Journey to Consolidation 2024-04-12 at 20:46 By Learn how far cybersecurity has come from scattered resources to consolidation the future. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Cybersecurity Decluttered: A Journey to Consolidation Read More »

NIST Launches Cybersecurity Framework (CSF) 2.0

NIST Launches Cybersecurity Framework (CSF) 2.0 2024-03-20 at 07:46 By On February 26, 2024, the National Institute of Standards and Technology (NIST) released the official 2.0 version of the Cyber Security Framework (CSF). This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

NIST Launches Cybersecurity Framework (CSF) 2.0 Read More »

Unifying Cloud Security Beyond Siloes

Unifying Cloud Security Beyond Siloes 2024-02-06 at 20:32 By Attacks don’t stay in siloes, and neither should your security solutions. Explore the benefits of a cybersecurity platform that consolidates security across multiple layers—including the cloud—for more proactive risk management. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

Unifying Cloud Security Beyond Siloes Read More »

Prevent BEC with AI-Powered Email and Collaboration

Prevent BEC with AI-Powered Email and Collaboration 2024-01-26 at 23:31 By Latest Trend Vision One™ platform integration addresses growing need for streamlined IT and security operations across email and messaging environments. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Prevent BEC with AI-Powered Email and Collaboration Read More »

Reduce Business Email Compromise with Collaboration

Reduce Business Email Compromise with Collaboration 2024-01-18 at 22:16 By Here’s the latest Trend Vision One™ platform integration addressing the growing need for collaboration in business email security space. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Reduce Business Email Compromise with Collaboration Read More »

Scroll to Top