Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
CVE-2025-55182: React2Shell Analysis, Proof-of-Concept Chaos, and In-the-Wild Exploitation
Sfruttamento vulnerabilità

CVE-2025-55182: React2Shell Analysis, Proof-of-Concept Chaos, and In-the-Wild Exploitation

CVE-2025-55182 is a CVSS 10.0 pre-authentication RCE affecting React Server Components. Amid the flood of fake proof-of-concept exploits, scanners, exploits, and widespread misconceptions, this technical analysis intends to cut through the noise.

Dec 10, 2025
Intelligenza artificiale (IA)

What Cyber Defenders Really Think About AI Risk

Learn how Trend Micro's 2025 Trend Micro Defenders Survey Report highlights current AI-related cybersecurity priorities and where security professionals use AI to their advantage.

Annual Predictions Dec 18, 2025

Save to Folio

Annual Predictions Dec 18, 2025

Save to Folio

Conformità e rischi

Cyber Risk Management: Defenders Tell It Like It Is

Based on more than 3,000 responses from cybersecurity professionals in nearly 90 countries, our Trend Micro Defenders Survey Report 2025 shines a bright light on the current state of cyber risk management. From the impact of cloud and AI on IT environments to top technical and human challenges, this year’s findings have a lot to say about the pressures security teams are under and what organizations are doing to tighten their grip on cyber risk.

Annual Predictions Dec 15, 2025

Save to Folio

Annual Predictions Dec 15, 2025

Save to Folio

Minacce cyber

AI-Automated Threat Hunting Brings GhostPenguin Out of the Shadows

In this blog entry, Trend™ Research provides a comprehensive breakdown of GhostPenguin, a previously undocumented Linux backdoor with low detection rates that was discovered through AI-powered threat hunting and in-depth malware analysis.

Latest News Dec 08, 2025

Save to Folio

Latest News Dec 08, 2025

Save to Folio