Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Update Now: PaperCut Vulnerability CVE-2023-27350 Under Active Exploitation
Exploity i luki w zabezpieczeniach

Update Now: PaperCut Vulnerability CVE-2023-27350 Under Active Exploitation

Two vulnerabilities in PaperCut have been found, and one of them is being actively exploited in the wild. This blog entry provides a summary of the vulnerabilities, and includes security guidance for IT and SOC professionals.

2023/04/26
Chmura

IBM Infrastructure: Continuous Risk & Compliance

Learn all about AI-powered visibility, telemetry, and proactive security across mainframe, cloud, containers, and enterprise workloads.

Latest News 2025/11/12

Save to Folio

Latest News 2025/11/12

Save to Folio

Cyberzagrożenia

How are you managing cloud risk?

Learn why managing cloud risk demands unified visibility, continuous risk assessment, and efficient security operations. Discover how a full-featured CNAPP like Trend Vision One™ Cloud Security enables organizations to move from reactive to proactive cloud protection.

Security Strategies 2025/10/31

Save to Folio

Security Strategies 2025/10/31

Save to Folio

Złośliwe oprogramowanie

Active Water Saci Campaign Spreading Via WhatsApp Features Multi-Vector Persistence and Sophisticated C&C

Continuous investigation on the Water Saci campaign reveals innovative email-based C&C system, multi-vector persistence, and real-time command capabilities that allow attackers to orchestrate coordinated botnet operations, gather detailed campaign intelligence, and dynamically control malware activity across multiple infected machines.

Latest News 2025/10/27

Save to Folio

Latest News 2025/10/27

Save to Folio

Cyberzagrożenia

How Trend Micro Empowers the SOC with Agentic SIEM

By delivering both XDR leadership and Agentic SIEM innovation under one platform, Trend is redefining what security operations can be.

Consumer Focus 2025/10/21

Save to Folio

Consumer Focus 2025/10/21

Save to Folio

Złośliwe oprogramowanie

Fast, Broad, and Elusive: How Vidar Stealer 2.0 Upgrades Infostealer Capabilities

Trend™ Research examines the latest version of the Vidar stealer, which features a full rewrite in C, a multithreaded architecture, and several enhancements that warrant attention. Its timely evolution suggests that Vidar is positioning itself to occupy the space left after Lumma Stealer’s decline.

Research 2025/10/21

Save to Folio

Research 2025/10/21

Save to Folio