Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits
Cyber Threats

RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits

Trend™ Research and ZDI Threat Hunters have identified a large-scale RondoDox botnet campaign exploiting over 50 vulnerabilities across more than 30 vendors, including flaws first seen in Pwn2Own contests.

2025/10/09
Cyber Threats

AI-Automated Threat Hunting Brings GhostPenguin Out of the Shadows

In this blog entry, Trend™ Research provides a comprehensive breakdown of GhostPenguin, a previously undocumented Linux backdoor with low detection rates that was discovered through AI-powered threat hunting and in-depth malware analysis.

Latest News 2025/12/08

Save to Folio

Latest News 2025/12/08

Save to Folio

Compliance & Risks

Project View: A New Era of Prioritized and Actionable Cloud Security

In today's cloud-first world, security teams face an overwhelming flood of alerts, fragmented visibility, and reactive workflows. The complexity of modern cloud environments—spanning multi-cloud deployments, ephemeral assets, and decentralized ownership—demands a new approach to risk management.

How To 2025/12/04

Save to Folio

How To 2025/12/04

Save to Folio

Cyber Threats

What’s your CNAPP maturity?

More and more enterprises are opting for cloud-native application protection platforms (CNAPPs) instead of complex and hard-to-manage cloud security point solutions. Find out where your organization is on its CNAPP maturity journey.

Consumer Focus 2025/12/01

Save to Folio

Consumer Focus 2025/12/01

Save to Folio

Compliance & Risks

Elevate Your Cloud Security Strategy

Learn to elevate your cloud security strategy & overcome complexity with Vision One™.

Security Strategies 2025/12/01

Save to Folio

Security Strategies 2025/12/01

Save to Folio

Cyber Threats

Shai-hulud 2.0 Campaign Targets Cloud and Developer Ecosystems

Shai-hulud 2.0 campaign features a sophisticated variant capable of stealing credentials and secrets from major cloud platforms and developer services, while automating the backdooring of NPM packages maintained by victims. Its advanced tactics enable rapid, stealthy propagation across the software supply chain, putting countless downstream users at risk.

Latest News 2025/11/27

Save to Folio

Latest News 2025/11/27

Save to Folio

Exploits & Vulnerabilities

Trend & AWS Partner on Cloud IPS: One-Click Protection

In the race to secure cloud infrastructure, intrusion prevention systems (IPS) remain one of the most critical yet complex at the cloud network layer of defense. For many organizations, deploying IPS in the cloud is a balancing act between agility and control.

Latest News 2025/11/20

Save to Folio

Latest News 2025/11/20

Save to Folio