Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits
Cybermenaces

RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits

The Trend Zero Day Initiative™ (ZDI) and Trend™ Research teams have identified a large-scale RondoDox botnet campaign exploiting over 50 vulnerabilities across more than 30 vendors, including flaws first seen in Pwn2Own contests.

2025/10/09
Cybermenaces

How Trend Micro Empowers the SOC with Agentic SIEM

By delivering both XDR leadership and Agentic SIEM innovation under one platform, Trend is redefining what security operations can be.

Consumer Focus 2025/10/21

Save to Folio

Consumer Focus 2025/10/21

Save to Folio

Malware

Fast, Broad, and Elusive: How Vidar Stealer 2.0 Upgrades Infostealer Capabilities

Trend™ Research examines the latest version of the Vidar stealer, which features a full rewrite in C, a multithreaded architecture, and several enhancements that warrant attention. Its timely evolution suggests that Vidar is positioning itself to occupy the space left after Lumma Stealer’s decline.

Research 2025/10/21

Save to Folio

Research 2025/10/21

Save to Folio

Exploitations de & failles de sécurité

Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits

Trend™ Research has uncovered an attack campaign exploiting the Cisco SNMP vulnerability CVE-2025-20352, allowing remote code execution and rootkit deployment on unprotected devices, with impacts observed on Cisco 9400, 9300, and legacy 3750G series.

Latest News 2025/10/15

Save to Folio

Latest News 2025/10/15

Save to Folio

Cybermenaces

RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits

The Trend Zero Day Initiative™ (ZDI) and Trend™ Research teams have identified a large-scale RondoDox botnet campaign exploiting over 50 vulnerabilities across more than 30 vendors, including flaws first seen in Pwn2Own contests.

Latest News 2025/10/09

Save to Folio

Latest News 2025/10/09

Save to Folio

Attaques ciblées & APT

Weaponized AI Assistants & Credential Thieves

Learn the state of AI and the NPM ecosystem with the recent s1ngularity' weaponized AI for credential theft.

Research 2025/10/09

Save to Folio

Research 2025/10/09

Save to Folio

Intelligence artificielle (IA)

How Your AI Chatbot Can Become a Backdoor

In this post of THE AI BREACH, learn how your Chatbot can become a backdoor.

Research 2025/10/08

Save to Folio

Research 2025/10/08

Save to Folio