Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits
Cyber Threats

RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits

Trend™ Research and ZDI Threat Hunters have identified a large-scale RondoDox botnet campaign exploiting over 50 vulnerabilities across more than 30 vendors, including flaws first seen in Pwn2Own contests.

2025/10/09
Ransomware

Web Shells, Tunnels, and Ransomware: Dissecting a Warlock Attack

Warlock continues to enhance its attack chain with new tactics to improve persistence, lateral movement, and defense evasion using an expanded toolset: TightVNC Yuze, and a persistent BYOVD technique leveraging the NSec driver.

Latest News 2026/03/16

Save to Folio

Latest News 2026/03/16

Save to Folio

Artificial Intelligence (AI)

Securing Autonomous AI Agents with TrendAI & NVIDIA OpenShell

Learn how TrendAI and NVIDIA OpenShell help secure autonomous AI agents and build trusted enterprise AI systems with stronger visibility and control.

Latest News 2026/03/16

Save to Folio

Latest News 2026/03/16

Save to Folio

Malware

Through the Lens of MDR: Analysis of KongTuke’s ClickFix Abuse of Compromised WordPress Sites

Our analysis of an active KongTuke campaign deploying modeloRAT — malware capable of reconnaissance, command execution, and persistent access — through compromised WordPress sites and fake CAPTCHA lures shows that the group still operates this delivery chain in parallel with the newer CrashFix technique.

Research 2026/03/10

Save to Folio

Research 2026/03/10

Save to Folio

Artificial Intelligence (AI)

CISOs in a Pinch: A Security Analysis of OpenClaw

Learn about OpenClaw (a sovereign agent) and how this can be viable for enterprises.

Expert Perspective 2026/03/10

Save to Folio

Expert Perspective 2026/03/10

Save to Folio

Artificial Intelligence (AI)

TrendAI™ at [un]prompted 2026: From KYC Exploits to Agentic Defense

At [un]prompted 2026, TrendAI™ demonstrated how documents can be used to exploit AI-driven KYC pipelines and introduced FENRIR, an automated system for discovering AI vulnerabilities at scale.

Latest News 2026/03/09

Save to Folio

Latest News 2026/03/09

Save to Folio

Malware

New BoryptGrab Stealer Targets Windows Users via Deceptive GitHub Pages

The BoryptGrab campaign uses fake SEO‑optimized GitHub repositories and deceptive download pages to distribute a data‑stealing malware family that delivers multiple payloads, including a reverse SSH backdoor, to Windows users.

Research 2026/03/05

Save to Folio

Research 2026/03/05

Save to Folio