Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
CVE-2025-55182: React2Shell Analysis, Proof-of-Concept Chaos, and In-the-Wild Exploitation
Exploits & Vulnerabilities

CVE-2025-55182: React2Shell Analysis, Proof-of-Concept Chaos, and In-the-Wild Exploitation

CVE-2025-55182 is a CVSS 10.0 pre-authentication RCE affecting React Server Components. Amid the flood of fake proof-of-concept exploits, scanners, exploits, and widespread misconceptions, this technical analysis intends to cut through the noise.

Dec 10, 2025
Cyber Threats

AI-Automated Threat Hunting Brings GhostPenguin Out of the Shadows

In this blog entry, Trend™ Research provides a comprehensive breakdown of GhostPenguin, a previously undocumented Linux backdoor with low detection rates that was discovered through AI-powered threat hunting and in-depth malware analysis.

Latest News Dec 08, 2025

Save to Folio

Latest News Dec 08, 2025

Save to Folio

Compliance & Risks

Project View: A New Era of Prioritized and Actionable Cloud Security

In today's cloud-first world, security teams face an overwhelming flood of alerts, fragmented visibility, and reactive workflows. The complexity of modern cloud environments—spanning multi-cloud deployments, ephemeral assets, and decentralized ownership—demands a new approach to risk management.

How To Dec 04, 2025

Save to Folio

How To Dec 04, 2025

Save to Folio

Cyber Threats

What’s your CNAPP maturity?

More and more enterprises are opting for cloud-native application protection platforms (CNAPPs) instead of complex and hard-to-manage cloud security point solutions. Find out where your organization is on its CNAPP maturity journey.

Consumer Focus Dec 01, 2025

Save to Folio

Consumer Focus Dec 01, 2025

Save to Folio

Compliance & Risks

Elevate Your Cloud Security Strategy

Learn to elevate your cloud security strategy & overcome complexity with Vision One™.

Security Strategies Dec 01, 2025

Save to Folio

Security Strategies Dec 01, 2025

Save to Folio

Cyber Threats

Shai-hulud 2.0 Campaign Targets Cloud and Developer Ecosystems

Shai-hulud 2.0 campaign features a sophisticated variant capable of stealing credentials and secrets from major cloud platforms and developer services, while automating the backdooring of NPM packages maintained by victims. Its advanced tactics enable rapid, stealthy propagation across the software supply chain, putting countless downstream users at risk.

Latest News Nov 27, 2025

Save to Folio

Latest News Nov 27, 2025

Save to Folio