Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Update Now: PaperCut Vulnerability CVE-2023-27350 Under Active Exploitation
Exploity i luki w zabezpieczeniach

Update Now: PaperCut Vulnerability CVE-2023-27350 Under Active Exploitation

Two vulnerabilities in PaperCut have been found, and one of them is being actively exploited in the wild. This blog entry provides a summary of the vulnerabilities, and includes security guidance for IT and SOC professionals.

April 26, 2023
APT i ataki ukierunkowane

Earth Preta Campaign Uses DOPLUGS to Target Asia

In this blog entry, we focus on Earth Preta's campaign that employed a variant of the DOPLUGS malware to target Asian countries.

Research Feb 20, 2024

Save to Folio

Research Feb 20, 2024

Save to Folio

Exploity i luki w zabezpieczeniach

SmartScreen Vulnerability: CVE-2024-21412 Facts and Fixes

This entry aims to provide additional context to CVE-2024-21412, how it can be used by threat actors, and how Trend protects customers from this specific vulnerability.

Expert Perspective Feb 13, 2024

Save to Folio

Expert Perspective Feb 13, 2024

Save to Folio

Exploity i luki w zabezpieczeniach

CVE-2024-21412: Water Hydra Targets Traders With Microsoft Defender SmartScreen Zero-Day

The APT group Water Hydra has been exploiting the Microsoft Defender SmartScreen vulnerability (CVE-2024-21412) in its campaigns targeting financial market traders. This vulnerability, which has now been patched by Microsoft, was discovered and disclosed by the Trend Micro Zero Day Initiative.

Research Feb 13, 2024

Save to Folio

Research Feb 13, 2024

Save to Folio

Artificial Intelligence (AI)

What Generative AI Means for Cybersecurity in 2024

After a full year of life with ChatGPT cybersecurity experts have a clearer sense of how criminals are using generative AI to enhance attacks - learn what generative AI means for cybersecurity in 2024.

Foresight Feb 08, 2024

Save to Folio

Foresight Feb 08, 2024

Save to Folio

Cyberzagrożenia

A Deepfake Scammed a Bank out of $25M — Now What?

A finance worker in Hong Kong was tricked by a deepfake video conference. The future of defending against deepfakes is as much as human challenge as a technological one.

Latest News Feb 07, 2024

Save to Folio

Latest News Feb 07, 2024

Save to Folio

Cyberzagrożenia

Unifying Cloud Security Beyond Siloes

Attacks don’t stay in siloes, and neither should your security solutions. Explore the benefits of a cybersecurity platform that consolidates security across multiple layers—including the cloud—for more proactive risk management.

Security Strategies Feb 06, 2024

Save to Folio

Security Strategies Feb 06, 2024

Save to Folio

APT i ataki ukierunkowane

Pawn Storm Uses Brute Force and Stealth Against High-Value Targets

To help defenders learn more about Pawn Storm's activities and adjust their defenses, we offer a technical analysis of some of the threat actor's recent and updated techniques.

Research Jan 31, 2024

Save to Folio

Research Jan 31, 2024

Save to Folio

Cyberprzestępczość

Prevent BEC with AI-Powered Email and Collaboration

Latest Trend Vision One™ platform integration addresses growing need for streamlined IT and security operations across email and messaging environments.

Latest News Jan 26, 2024

Save to Folio

Latest News Jan 26, 2024

Save to Folio