Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Redefining Enterprise Defense in the Era of AI-Led Cyberattacks
Artificial Intelligence (AI)

Redefining Enterprise Defense in the Era of AI-Led Cyberattacks

More cybercriminals are turning to using autonomous AI tools to upgrade their attacks, as exemplified by the recent utilization of Anthropic’s Claude Code, prompting an urgent need for enterprises to adopt agentic AI-driven security platforms and proactive defenses to counter AI-related threats.

14/11/2025
Artificial Intelligence (AI)

Redefining Enterprise Defense in the Era of AI-Led Cyberattacks

More cybercriminals are turning to using autonomous AI tools to upgrade their attacks, as exemplified by the recent utilization of Anthropic’s Claude Code, prompting an urgent need for enterprises to adopt agentic AI-driven security platforms and proactive defenses to counter AI-related threats.

Latest News 14/11/2025

Save to Folio

Latest News 14/11/2025

Save to Folio

Cloud

IBM Infrastructure: Continuous Risk & Compliance

Learn all about AI-powered visibility, telemetry, and proactive security across mainframe, cloud, containers, and enterprise workloads.

Latest News 12/11/2025

Save to Folio

Latest News 12/11/2025

Save to Folio

Cyber Threats

How are you managing cloud risk?

Learn why managing cloud risk demands unified visibility, continuous risk assessment, and efficient security operations. Discover how a full-featured CNAPP like Trend Vision One™ Cloud Security enables organizations to move from reactive to proactive cloud protection.

Security Strategies 31/10/2025

Save to Folio

Security Strategies 31/10/2025

Save to Folio

Malware

Active Water Saci Campaign Spreading Via WhatsApp Features Multi-Vector Persistence and Sophisticated C&C

Continuous investigation on the Water Saci campaign reveals innovative email-based C&C system, multi-vector persistence, and real-time command capabilities that allow attackers to orchestrate coordinated botnet operations, gather detailed campaign intelligence, and dynamically control malware activity across multiple infected machines.

Latest News 27/10/2025

Save to Folio

Latest News 27/10/2025

Save to Folio