Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Update Now: PaperCut Vulnerability CVE-2023-27350 Under Active Exploitation
Exploity i luki w zabezpieczeniach

Update Now: PaperCut Vulnerability CVE-2023-27350 Under Active Exploitation

Two vulnerabilities in PaperCut have been found, and one of them is being actively exploited in the wild. This blog entry provides a summary of the vulnerabilities, and includes security guidance for IT and SOC professionals.

April 26, 2023
Cyberzagrożenia

Trend Micro Leading the Fight to Secure AI

New MITRE ATLAS submission helps strengthen organizations’ cyber resilience

Latest News May 27, 2025

Save to Folio

Latest News May 27, 2025

Save to Folio

APT i ataki ukierunkowane

Earth Lamia Develops Custom Arsenal to Target Multiple Industries

Trend™ Research has been tracking an active APT threat actor named Earth Lamia, targeting multiple industries in Brazil, India and Southeast Asia countries at least since 2023. The threat actor primarily exploits vulnerabilities in web applications to gain access to targeted organizations.

Research May 27, 2025

Save to Folio

Research May 27, 2025

Save to Folio

Sztuczna inteligencja (AI)

Using Agentic AI & Digital Twin for Cyber Resilience

Learn how Trend is combining agentic AI and digital twin to transform the way organizations protect themselves from cyber threats.

Latest News May 18, 2025

Save to Folio

Latest News May 18, 2025

Save to Folio

Sztuczna inteligencja (AI)

Trend Secures AI Infrastructure with NVIDIA

Together, we are focused on securing the full AI lifecycle—from development and training to deployment and inference—across cloud, data center, and AI factories.

Latest News May 18, 2025

Save to Folio

Latest News May 18, 2025

Save to Folio

Sztuczna inteligencja (AI)

Trend Micro Puts a Spotlight on AI at Pwn2Own Berlin

Get a sneak peak into how Trend Micro's Pwn2Own Berlin 2025 is breaking new ground, focusing on AI infrastructure and finding the bugs to proactively safeguard the future of computing.

Latest News May 13, 2025

Save to Folio

Latest News May 13, 2025

Save to Folio

Maritime Cybersecurity: Threats & Regulations Loom

This review summarizes the key insights shared during the webinar held on April 9th, which featured maritime cybersecurity experts discussing the growing challenges facing ports, logistics operations, and global supply chains.

Expert Perspective May 09, 2025

Save to Folio

Expert Perspective May 09, 2025

Save to Folio

Sztuczna inteligencja (AI)

Exploring PLeak: An Algorithmic Method for System Prompt Leakage

What is PLeak, and what are the risks associated with it? We explored this algorithmic technique and how it can be used to jailbreak LLMs, which could be leveraged by threat actors to manipulate systems and steal sensitive data.

Research May 01, 2025

Save to Folio

Research May 01, 2025

Save to Folio