Newsroom

Research, News, and Perspective

Author: Joseph C Chen (Threat Researcher), Daniel Lunghi (Threat Researcher)

MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks

Trend Micro’s monitoring of the MOONSHINE exploit kit revealed how it’s used by the threat actor Earth Minotaur to exploit Android messaging app vulnerabilities and install the DarkNimbus backdoor for surveillance.

Dec 05, 2024

Author: Morton Swimmer (Sr. Threat Researcher), Philippe Lin (Sr. Threat Researcher), Vincenzo Ciancaglini (Sr. Threat Researcher), Marco Balduzzi (Sr. Threat Researcher), Stephen Hilt (Sr. Threat Researcher)

The Road to Agentic AI: Exposed Foundations

Our research into Retrieval Augmented Generation (RAG) systems uncovered at least 80 unprotected servers. We highlight this problem, which can lead to potential data loss and unauthorized access.

Dec 04, 2024

Author: Sunil Bharti (Senior Threat Researcher)

Gafgyt Malware Broadens Its Scope in Recent Attacks

Our researchers identified threat actors exploiting misconfigured Docker servers to spread the Gafgyt malware. This threat traditionally targets IoT devices; this new tactic signals a change in its behavior.

Dec 03, 2024

DevOps Resource Center

Author: Michael Langford (Product Marketing)

AWS Graviton Use Cases

Discover how AWS Graviton’s optimized processors help provide a superior price-performance ratio. Available for AWS-managed services, you’ll gain insight on strategies, use cases, and insight on how to get the most out of AWS Graviton.

Sep 28, 2023

How to Protect Your CI/CD Pipeline

Continuous integration and continuous delivery/deployment (CI/CD) has won over app developers, with enterprise cybersecurity teams on the hook to protect CI/CD pipelines. OWASP’s Top 10 CI/CD Security Risks clarify what to watch for.

Aug 29, 2023

Author: Mike Milner (Director of Cloud Native Technology)

What Can Generative AI do for Hybrid Cloud Security?

As enterprise security operations centers absorb cloud security functions, they face new challenges and require new skills. Generative AI can help by laying a secure cloud foundation and empowering SOC teams to respond effectively when threats arise.

Aug 23, 2023

CISO Resource Center

Worldwide 2023 Email Phishing Statistics and Examples

Explore the need for going beyond built-in Microsoft 365 and Google Workspace™ security based on email threats detected in 2023.

Jun 20, 2024

Guide to Better Extended Threat Detection and Response (XDR)

Discover how XDR can enhance threat detection and response to improve a SecOps team’s efficiency and outcomes.

Jun 03, 2024

Author: David Chow (Chief Technology Strategy Officer)

A Necessary Digital Odyssey of RPA and AI/ML at HUD

Explore two RPA and AI/ML use cases at HUD during the operational challenges of the longest US Government shutdown, a rigid legacy IT environment, and complex federal regulations.

Mar 13, 2024

Media Contacts

Pick your region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
USA
1 (817) 522-7911
Lisiane Lenz
AMEA
(971) 505785061
Kalle Salminen
Europe - Finland
+358400810359
Lorena Rodriguez
Latin America
+52 55 3067-6000
Kaori Iizumi
Japan
+81-3-5334-3658
Angela Chiang
Taiwan
+ 886 2376 1222

Discover Trend Micro

The history, people, and values behind the company.

Connect with us