Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Update Now: PaperCut Vulnerability CVE-2023-27350 Under Active Exploitation
Exploity i luki w zabezpieczeniach

Update Now: PaperCut Vulnerability CVE-2023-27350 Under Active Exploitation

Two vulnerabilities in PaperCut have been found, and one of them is being actively exploited in the wild. This blog entry provides a summary of the vulnerabilities, and includes security guidance for IT and SOC professionals.

April 26, 2023
Sztuczna inteligencja (AI)

EvilAI Operators Use AI-Generated Code and Fake Apps for Far-Reaching Attacks

Combining AI-generated code and social engineering, EvilAI operators are executing a rapidly expanding campaign, disguising their malware as legitimate applications to bypass security, steal credentials, and persistently compromise organizations worldwide.

Research Sep 11, 2025

Save to Folio

Research Sep 11, 2025

Save to Folio

Cyberzagrożenia

What’s Your Cybersecurity Maturity?

This blog post looks at four key milestones along the cybersecurity maturity journey and poses some questions you can ask to determine the stage of your organization’s progress.

Security Strategies Sep 10, 2025

Save to Folio

Security Strategies Sep 10, 2025

Save to Folio

Exploity i luki w zabezpieczeniach

Three Critical Facts About Cyber Risk Management

For CISOs responsible for cyber risk management, these three insights will help build a strong and reliable foundation for your proactive security strategy.

Security Strategies Sep 04, 2025

Save to Folio

Security Strategies Sep 04, 2025

Save to Folio

Złośliwe oprogramowanie

An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via ‘Cracked’ Apps

Trend™ Research analyzed a campaign distributing Atomic macOS Stealer (AMOS), a malware family targeting macOS users. Attackers disguise the malware as “cracked” versions of legitimate apps, luring users into installation.

Investigations Sep 04, 2025

Save to Folio

Investigations Sep 04, 2025

Save to Folio

Zgodność z przepisami i ryzyko

Trend Vision One Integrates Microsoft Defender for Endpoint

Discover how Trend Vision One integrates with Microsoft Defender for Endpoint to unify visibility, close security gaps, and accelerate risk mitigation - maximizing protection without replacing existing tools.

Security Strategies Aug 26, 2025

Save to Folio

Security Strategies Aug 26, 2025

Save to Folio