Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Breaking Down Earth Estries' Persistent TTPs in Prolonged Cyber Operations
Attaques ciblées & APT

Breaking Down Earth Estries' Persistent TTPs in Prolonged Cyber Operations

Discover how Earth Estries employs a diverse set of tactics, techniques, and tools, including malware such as Zingdoor and Snappybee, for its campaigns.

November 08, 2024
Artificial Intelligence (AI)

5 AI Security Takeaways featuring Forrester

Highlights from the recent discussion between Trend Micro’s David Roth, CRO Enterprise America, and guest speaker Jeff Pollard, VP, Principal Analyst, Forrester about AI hype versus reality and how to secure AI in the workplace.

Security Strategies Nov 13, 2024

Save to Folio

Security Strategies Nov 13, 2024

Save to Folio

Risques liés à la & conformité

SOC Around the Clock: World Tour Survey Findings

Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what SOC teams had to say.

Research Nov 04, 2024

Save to Folio

Research Nov 04, 2024

Save to Folio

Artificial Intelligence (AI)

AI Pulse: Election Deepfakes, Disasters, Scams & more

In the final weeks before November’s U.S. election, cybersecurity experts were calling October 2024 the “month of mischief”—a magnet for bad actors looking to disrupt the democratic process through AI-generated misinformation. This issue of AI Pulse looks at what can be done about deepfakes and other AI scams, and why defense-in-depth is the only way to go.

Expert Perspective Oct 31, 2024

Save to Folio

Expert Perspective Oct 31, 2024

Save to Folio

Cybermenaces

Attacker Abuses Victim Resources to Reap Rewards from Titan Network

In this blog entry, we discuss how an attacker took advantage of the Atlassian Confluence vulnerability CVE-2023-22527 to connect servers to the Titan Network for cryptomining purposes.

Research Oct 30, 2024

Save to Folio

Research Oct 30, 2024

Save to Folio

Cybermenaces

Understanding the Initial Stages of Web Shell and VPN Threats: An MXDR Analysis

While cyberattacks that employ web shells and VPN compromise are not particularly novel, they are still prevalent. The recent incidents that Trend Micro MXDR analyzed highlight the importance of behavioral analysis and anomaly detection in security measures.

Research Oct 24, 2024

Save to Folio

Research Oct 24, 2024

Save to Folio

Cybermenaces

Unmasking Prometei: A Deep Dive Into Our MXDR Findings

How does Prometei insidiously operate in a compromised system? This Managed Extended Detection and Response investigation conducted with the help of Trend Vision One provides a comprehensive analysis of the inner workings of this botnet so users can stop the threat in its tracks before it inflicts damage to the system.

Research Oct 23, 2024

Save to Folio

Research Oct 23, 2024

Save to Folio