Trend Micro Research : Cyber Threats

Why You Need Network Detection & Response Now

Why You Need Network Detection & Response Now 2024-07-09 at 21:26 By Cybersecurity teams are well-equipped to handle threats to technology assets that they manage. But with unmanaged devices providing ideal spots for attackers to lurk unseen, network detection and response capabilities have become vitally important. This article is an excerpt from Trend Micro Research, […]

React to this headline:

Loading spinner

Why You Need Network Detection & Response Now Read More »

An In-Depth Look at Crypto-Crime in 2023 Part 1

An In-Depth Look at Crypto-Crime in 2023 Part 1 2024-07-08 at 22:31 By Cybersecurity is a growing concern in today’s digital age, as more sensitive information is stored and transmitted online. With the rise of cryptocurrencies, there has also been a rise in crypto-crimes, which pose a significant threat to the security of both individuals

React to this headline:

Loading spinner

An In-Depth Look at Crypto-Crime in 2023 Part 1 Read More »

Turning Jenkins Into a Cryptomining Machine From an Attacker’s Perspective

Turning Jenkins Into a Cryptomining Machine From an Attacker’s Perspective 2024-07-05 at 12:02 By In this blog entry, we will discuss how the Jenkins Script Console can be weaponized by attackers for cryptomining activity if not configured properly. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

Turning Jenkins Into a Cryptomining Machine From an Attacker’s Perspective Read More »

Mekotio Banking Trojan Threatens Financial Systems in Latin America

Mekotio Banking Trojan Threatens Financial Systems in Latin America 2024-07-04 at 12:16 By We’ve recently seen a surge in attacks involving the Mekotio banking trojan. In this blog entry, we’ll provide an overview of the trojan and what it does. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Mekotio Banking Trojan Threatens Financial Systems in Latin America Read More »

Examining Water Sigbin’s Infection Routine Leading to an XMRig Cryptominer

Examining Water Sigbin’s Infection Routine Leading to an XMRig Cryptominer 2024-06-28 at 08:31 By We analyze the multi-stage loading technique used by Water Sigbin to deliver the PureCrypter loader and XMRIG crypto miner. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Examining Water Sigbin’s Infection Routine Leading to an XMRig Cryptominer Read More »

Attackers in Profile: menuPass and ALPHV/BlackCat

Attackers in Profile: menuPass and ALPHV/BlackCat 2024-06-26 at 18:46 By To test the effectiveness of managed services like our Trend Micro managed detection and response offering, MITRE Engenuity™ combined the tools, techniques, and practices of two globally notorious bad actors: menuPass and ALPHV/BlackCat. This blog tells the story of why they were chosen and what

React to this headline:

Loading spinner

Attackers in Profile: menuPass and ALPHV/BlackCat Read More »

Omdia Report: Trend Disclosed 60% of Vulnerabilities

Omdia Report: Trend Disclosed 60% of Vulnerabilities 2024-06-25 at 15:16 By The latest Omdia Vulnerability Report shows Trend MicroTM Zero Day InitiativeTM (ZDI) spearheaded 60% of 2023 disclosures, underscoring its role in cybersecurity threat prevention. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Omdia Report: Trend Disclosed 60% of Vulnerabilities Read More »

Not Just Another 100% Score: MITRE ENGENIUTY ATT&CK

Not Just Another 100% Score: MITRE ENGENIUTY ATT&CK 2024-06-18 at 19:32 By The latest MITRE Engenuity ATT&CK Evaluations pitted leading managed detection and response (MDR) services against threats modeled on the menuPass and BlackCat/AlphV adversary groups. Trend Micro achieved 100% detection across all 15 major attack steps with an 86% actionable rate for those steps—

React to this headline:

Loading spinner

Not Just Another 100% Score: MITRE ENGENIUTY ATT&CK Read More »

Commando Cat: A Novel Cryptojacking Attack Abusing Docker Remote API Servers

Commando Cat: A Novel Cryptojacking Attack Abusing Docker Remote API Servers 2024-06-06 at 11:01 By We analyze a cryptojacking attack campaign exploiting exposed Docker remote API servers to deploy cryptocurrency miners, using Docker images from the open-source Commando project. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

Commando Cat: A Novel Cryptojacking Attack Abusing Docker Remote API Servers Read More »

It’s Time to Up-Level Your EDR Solution

It’s Time to Up-Level Your EDR Solution 2024-06-03 at 18:01 By You may have EDR, but did you know you can add threat detection and response to improve a SecOps team’s efficiency and outcomes – read more. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this

React to this headline:

Loading spinner

It’s Time to Up-Level Your EDR Solution Read More »

2 Weeks Out: Evolution at RSAC 2024

2 Weeks Out: Evolution at RSAC 2024 2024-05-29 at 01:31 By Discover the latest innovations in cyber defense and Trend’s expert insights on AI, data security, and emerging threats This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

2 Weeks Out: Evolution at RSAC 2024 Read More »

ISPM & ITDR Synergize for AI-Based Identity Security

ISPM & ITDR Synergize for AI-Based Identity Security 2024-05-22 at 23:31 By In the ever-evolving landscape of cybersecurity, staying ahead of malicious actors requires a multifaceted approach. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

ISPM & ITDR Synergize for AI-Based Identity Security Read More »

Deepfakes and AI-Driven Disinformation Threaten Polls

Deepfakes and AI-Driven Disinformation Threaten Polls 2024-05-02 at 14:16 By Cheap and easy access to AI makes it harder to detect state-sponsored and homegrown campaigns during this election year This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Deepfakes and AI-Driven Disinformation Threaten Polls Read More »

Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks

Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks 2024-05-01 at 12:16 By This blog entry aims to highlight the dangers of internet-facing routers and elaborate on Pawn Storm’s exploitation of EdgeRouters, complementing the FBI’s advisory from February 27, 2024. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks Read More »

The Fall of LabHost: Law Enforcement Shuts Down Phishing Service Provider

The Fall of LabHost: Law Enforcement Shuts Down Phishing Service Provider 2024-04-18 at 04:16 By On April 18, 2024, the UK’s Metropolitan Police Service and others conducted an operation that succeeded in taking down the Phishing-as-a-Service provider LabHost. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

The Fall of LabHost: Law Enforcement Shuts Down Phishing Service Provider Read More »

Cybersecurity Decluttered: A Journey to Consolidation

Cybersecurity Decluttered: A Journey to Consolidation 2024-04-12 at 20:46 By Learn how far cybersecurity has come from scattered resources to consolidation the future. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Cybersecurity Decluttered: A Journey to Consolidation Read More »

A Necessary Digital Odyssey of RPA and AI/ML at HUD

A Necessary Digital Odyssey of RPA and AI/ML at HUD 2024-03-13 at 05:57 By Explore two RPA and AI/ML use cases at HUD during the operational challenges of the longest US Government shutdown, a rigid legacy IT environment, and complex federal regulations. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

A Necessary Digital Odyssey of RPA and AI/ML at HUD Read More »

AI Auctions: Collectibles, Taylor Swift, Jordan Bots

AI Auctions: Collectibles, Taylor Swift, Jordan Bots 2024-03-06 at 06:48 By Discover the fascinating world of AI, ML, and RPA and their real-world applications including the creation of a custom RPA bot for collecting rare sports memorabilia. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this

React to this headline:

Loading spinner

AI Auctions: Collectibles, Taylor Swift, Jordan Bots Read More »

Decoding Digital Transformation: AI, ML, and RPA in the Modern Era

Decoding Digital Transformation: AI, ML, and RPA in the Modern Era 2024-02-21 at 04:31 By Explore the first article in this series about AI, ML, and RPA, which aims to demystify and explore the full spectrum of these core technologies. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Decoding Digital Transformation: AI, ML, and RPA in the Modern Era Read More »

What Generative AI Means for Cybersecurity in 2024

What Generative AI Means for Cybersecurity in 2024 2024-02-08 at 19:00 By After a full year of life with ChatGPT cybersecurity experts have a clearer sense of how criminals are using generative AI to enhance attacks – learn what generative AI means for cybersecurity in 2024. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

What Generative AI Means for Cybersecurity in 2024 Read More »

Scroll to Top