Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via ‘Cracked’ Apps
Malware

An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via ‘Cracked’ Apps

Trend™ Research analyzed a campaign distributing Atomic macOS Stealer (AMOS), a malware family targeting macOS users. Attackers disguise the malware as “cracked” versions of legitimate apps, luring users into installation.

September 04, 2025
Ransomware

New LockBit 5.0 Targets Windows, Linux, ESXi

Trend™ Research analyzed source binaries from the latest activity from notorious LockBit ransomware with their 5.0 version that exhibits advanced obfuscation, anti-analysis techniques, and seamless cross-platform capabilities for Windows, Linux, and ESXi systems.

Latest News Sep 25, 2025

Save to Folio

Latest News Sep 25, 2025

Save to Folio

Artificial Intelligence (AI)

This Is How Your LLM Gets Compromised

Poisoned data. Malicious LoRAs. Trojan model files. AI attacks are stealthier than ever—often invisible until it’s too late. Here’s how to catch them before they catch you.

Research Sep 24, 2025

Save to Folio

Research Sep 24, 2025

Save to Folio

Artificial Intelligence (AI)

Domino Effect: How One Vendor's AI App Breach Toppled Giants

A single AI chatbot breach at Salesloft-Drift exposed data from 700+ companies, including security leaders. The attack shows how AI integrations expand risk, and why controls like IP allow-listing, token security, and monitoring are critical.

Research Sep 24, 2025

Save to Folio

Research Sep 24, 2025

Save to Folio

Artificial Intelligence (AI)

AI-Powered App Exposes User Data, Creates Risk of Supply Chain Attacks

Trend™ Research’s analysis of Wondershare RepairIt reveals how the AI-driven app exposed sensitive user data due to unsecure cloud storage practices and hardcoded credentials, creating risks of model tampering and supply chain attacks.

Research Sep 23, 2025

Save to Folio

Research Sep 23, 2025

Save to Folio

Artificial Intelligence (AI)

How AI-Native Development Platforms Enable Fake Captcha Pages

Cybercriminals are abusing AI-native platforms like Vercel, Netlify, and Lovable to host fake captcha pages that deceive users, bypass detection, and drive phishing campaigns.

Research Sep 19, 2025

Save to Folio

Research Sep 19, 2025

Save to Folio

Cyber Threats

What We Know About the NPM Supply Chain Attack

Trend™ Research outlines the critical details behind the ongoing NPM supply chain attack and offers essential steps to stay protected against potential compromise.

Latest News Sep 18, 2025

Save to Folio

Latest News Sep 18, 2025

Save to Folio

Artificial Intelligence (AI)

EvilAI Operators Use AI-Generated Code and Fake Apps for Far-Reaching Attacks

Combining AI-generated code and social engineering, EvilAI operators are executing a rapidly expanding campaign, disguising their malware as legitimate applications to bypass security, steal credentials, and persistently compromise organizations worldwide.

Research Sep 11, 2025

Save to Folio

Research Sep 11, 2025

Save to Folio

Cyber Threats

What’s Your Cybersecurity Maturity?

This blog post looks at four key milestones along the cybersecurity maturity journey and poses some questions you can ask to determine the stage of your organization’s progress.

Security Strategies Sep 10, 2025

Save to Folio

Security Strategies Sep 10, 2025

Save to Folio

Exploits & Vulnerabilities

Three Critical Facts About Cyber Risk Management

For CISOs responsible for cyber risk management, these three insights will help build a strong and reliable foundation for your proactive security strategy.

Security Strategies Sep 04, 2025

Save to Folio

Security Strategies Sep 04, 2025

Save to Folio