Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Proactive Security Insights for SharePoint Attacks (CVE-2025-53770 and CVE-2025-53771)
Exploits & Vulnerabilities

Proactive Security Insights for SharePoint Attacks (CVE-2025-53770 and CVE-2025-53771)

CVE-2025-53770 and CVE-2025-53771 are vulnerabilities in on-premise Microsoft SharePoint Servers that evolved from previously patched flaws, allowing unauthenticated remote code execution through advanced deserialization and ViewState abuse.

July 22, 2025
Malware

Back to Business: Lumma Stealer Returns with Stealthier Methods

Lumma Stealer has re-emerged shortly after its takedown. This time, the cybergroup behind this malware appears to be intent on employing more covert tactics while steadily expanding its reach. This article shares the latest methods used to propagate this threat.

Research Jul 22, 2025

Save to Folio

Research Jul 22, 2025

Save to Folio

Cloud

CISA's NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security

This blog explores key findings from CISA’s NIMBUS 2000 Cloud Identity Security Technical Exchange and how Trend Vision One™ Cloud Security aligns with these priorities. It highlights critical challenges in token validation, secrets management, and logging visibility—offering insights into how integrated security solutions can help organizations strengthen their cloud identity defenses and meet evolving federal standards.

Expert Perspective Jul 16, 2025

Save to Folio

Expert Perspective Jul 16, 2025

Save to Folio

Artificial Intelligence (AI)

Preventing Zero-Click AI Threats: Insights from EchoLeak

A zero-click exploit called EchoLeak reveals how AI assistants like Microsoft 365 Copilot can be manipulated to leak sensitive data without user interaction. This entry breaks down how the attack works, why it matters, and what defenses are available to proactively mitigate this emerging AI-native threat.

Jul 15, 2025

Save to Folio

Jul 15, 2025

Save to Folio

Ransomware

BERT Ransomware Group Targets Asia and Europe on Multiple Platforms

BERT is a newly emerged ransomware group that pairs simple code with effective execution—carrying out attacks across Europe and Asia. In this entry, we examine the group’s tactics, how their variants have evolved, and the tools they use to get past defenses and speed up encryption across platforms.

Jul 07, 2025

Save to Folio

Jul 07, 2025

Save to Folio

Cyber Threats

AI Dilemma: Emerging Tech as Cyber Risk Escalates

As AI adoption accelerates, businesses face mounting cyber threats—and urgent choices about secure implementation

Latest News Jul 03, 2025

Save to Folio

Latest News Jul 03, 2025

Save to Folio

Compliance & Risks

Why Trend Micro Continues to be Named a CNAPP Leader

Trend Micro is recognized for our Cloud CNAPP capabilities and product strategy—affirming our vision to deliver a cloud security solution that predicts, protects, and responds to threats across hybrid and multi-cloud environments.

Reports Jun 27, 2025

Save to Folio

Reports Jun 27, 2025

Save to Folio

Phishing

How to Build an Effective Security Awareness Program

This is a step-by-step guide to build a strong security awareness and training program that empowers your employees and protects your business.

How To Jun 27, 2025

Save to Folio

How To Jun 27, 2025

Save to Folio

Artificial Intelligence (AI)

Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI Agent

A single SQL injection bug in Anthropic’s SQLite MCP server—forked over 5,000 times—can seed stored prompts, exfiltrate data, and hand attackers the keys to entire agent workflows. This entry unpacks the attack chain and lays out concrete fixes to shut it down.

Jun 24, 2025

Save to Folio

Jun 24, 2025

Save to Folio