Trend Micro Research : Cyber Threats

IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024

IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024 2025-01-17 at 11:19 By Since the end of 2024, we have been continuously monitoring large-scale DDoS attacks orchestrated by an IoT botnet exploiting vulnerable IoT devices such as wireless routers and IP cameras. This article is an excerpt from Trend Micro Research, News […]

React to this headline:

Loading spinner

IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024 Read More »

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit 2025-01-09 at 09:17 By Our blog entry discusses a fake PoC exploit for LDAPNightmare (CVE-2024-49113) that is being used to distribute information-stealing malware. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit Read More »

Trend Micro Contributes and Maps Container Security to MITRE ATT&CK: A Game-Changer for Cyber Defense

Trend Micro Contributes and Maps Container Security to MITRE ATT&CK: A Game-Changer for Cyber Defense 2025-01-07 at 18:01 By Trend Micro leads the way by mapping its Container Security detection capabilities to the MITRE ATT&CK framework for Containers and contributing real-world attack data. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

Trend Micro Contributes and Maps Container Security to MITRE ATT&CK: A Game-Changer for Cyber Defense Read More »

AI Pulse: Top AI Trends from 2024 – A Look Back

AI Pulse: Top AI Trends from 2024 – A Look Back 2025-01-03 at 22:18 By In this edition of AI Pulse, let’s look back at top AI trends from 2024 in the rear view so we can more clearly predicts AI trends for 2025 and beyond. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

AI Pulse: Top AI Trends from 2024 – A Look Back Read More »

Python-Based NodeStealer Version Targets Facebook Ads Manager

Python-Based NodeStealer Version Targets Facebook Ads Manager 2024-12-19 at 09:46 By In this blog entry, Trend Micro’s Managed XDR team discuss their investigation into how the latest variant of NodeStealer is delivered through spear-phishing attacks, potentially leading to malware execution, data theft, and the exfiltration of sensitive information via Telegram. This article is an excerpt

React to this headline:

Loading spinner

Python-Based NodeStealer Version Targets Facebook Ads Manager Read More »

Link Trap: GenAI Prompt Injection Attack

Link Trap: GenAI Prompt Injection Attack 2024-12-17 at 03:20 By Prompt injection exploits vulnerabilities in generative AI to manipulate its behavior, even without extensive permissions. This attack can expose sensitive data, making awareness and preventive measures essential. Learn how it works and how to stay protected. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

Link Trap: GenAI Prompt Injection Attack Read More »

Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion

Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion 2024-12-13 at 10:04 By In this blog entry, we discuss a social engineering attack that tricked the victim into installing a remote access tool, triggering DarkGate malware activities and an attempted C&C connection. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion Read More »

INTERPOL & Trend’s Fight Against Cybercrime

INTERPOL & Trend’s Fight Against Cybercrime 2024-12-12 at 02:51 By Trend threat intelligence and training were crucial to the success of two major policing operations in 2024 This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

INTERPOL & Trend’s Fight Against Cybercrime Read More »

MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks

MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks 2024-12-05 at 09:33 By Trend Micro’s monitoring of the MOONSHINE exploit kit revealed how it’s used by the threat actor Earth Minotaur to exploit Android messaging app vulnerabilities and install the DarkNimbus backdoor for surveillance. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks Read More »

AI Pulse: The Good from AI and the Promise of Agentic

AI Pulse: The Good from AI and the Promise of Agentic 2024-12-03 at 03:54 By The perils of AI get a lot of airtime, but what are the upsides? This issue of AI Pulse looks at some of the good AI can bring, from strengthening cybersecurity to driving health breakthroughs—and how the coming wave of

React to this headline:

Loading spinner

AI Pulse: The Good from AI and the Promise of Agentic Read More »

5 AI Security Takeaways featuring Forrester

5 AI Security Takeaways featuring Forrester 2024-11-14 at 01:04 By Highlights from the recent discussion between Trend Micro’s David Roth, CRO Enterprise America, and guest speaker Jeff Pollard, VP, Principal Analyst, Forrester about AI hype versus reality and how to secure AI in the workplace. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

5 AI Security Takeaways featuring Forrester Read More »

SOC Around the Clock: World Tour Survey Findings

SOC Around the Clock: World Tour Survey Findings 2024-11-05 at 05:49 By Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what SOC teams had to say. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

SOC Around the Clock: World Tour Survey Findings Read More »

AI Pulse: Election Deepfakes, Disasters, Scams & more

AI Pulse: Election Deepfakes, Disasters, Scams & more 2024-10-31 at 22:02 By In the final weeks before November’s U.S. election, cybersecurity experts were calling October 2024 the “month of mischief”—a magnet for bad actors looking to disrupt the democratic process through AI-generated misinformation. This issue of AI Pulse looks at what can be done about

React to this headline:

Loading spinner

AI Pulse: Election Deepfakes, Disasters, Scams & more Read More »

Attacker Abuses Victim Resources to Reap Rewards from Titan Network

Attacker Abuses Victim Resources to Reap Rewards from Titan Network 2024-10-30 at 09:47 By In this blog entry, we discuss how an attacker took advantage of the Atlassian Confluence vulnerability CVE-2023-22527 to connect servers to the Titan Network for cryptomining purposes. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

Attacker Abuses Victim Resources to Reap Rewards from Titan Network Read More »

Understanding the Initial Stages of Web Shell and VPN Threats: An MXDR Analysis

Understanding the Initial Stages of Web Shell and VPN Threats: An MXDR Analysis 2024-10-24 at 12:33 By While cyberattacks that employ web shells and VPN compromise are not particularly novel, they are still prevalent. The recent incidents that Trend Micro MXDR analyzed highlight the importance of behavioral analysis and anomaly detection in security measures. This

React to this headline:

Loading spinner

Understanding the Initial Stages of Web Shell and VPN Threats: An MXDR Analysis Read More »

Unmasking Prometei: A Deep Dive Into Our MXDR Findings

Unmasking Prometei: A Deep Dive Into Our MXDR Findings 2024-10-23 at 16:23 By How does Prometei insidiously operate in a compromised system? This Managed Extended Detection and Response investigation conducted with the help of Trend Vision One provides a comprehensive analysis of the inner workings of this botnet so users can stop the threat in

React to this headline:

Loading spinner

Unmasking Prometei: A Deep Dive Into Our MXDR Findings Read More »

Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach

Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach 2024-10-22 at 12:47 By In this blog entry, we discuss how malicious actors are exploiting Docker remote API servers via gRPC/h2c to deploy the cryptominer SRBMiner to facilitate their mining of XRP on Docker hosts. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach Read More »

How to Mitigate the Impact of Rogue AI Risks

How to Mitigate the Impact of Rogue AI Risks 2024-10-17 at 23:34 By This is the latest blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

How to Mitigate the Impact of Rogue AI Risks Read More »

5 AI Security Takeaways featuring Forrester

5 AI Security Takeaways featuring Forrester 2024-10-17 at 23:34 By Highlights from the recent discussion between Trend Micro’s David Roth, CRO Enterprise America, and guest speaker Jeff Pollard, VP, Principal Analyst, Forrester about AI hype versus reality and how to secure AI in the workplace. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

5 AI Security Takeaways featuring Forrester Read More »

Silent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions

Silent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions 2024-10-15 at 11:02 By Trend Micro’s Threat Hunting Team discovered EDRSilencer, a red team tool that threat actors are attempting to abuse for its ability to block EDR traffic and conceal malicious activity. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

Silent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions Read More »

Scroll to Top