Últimos artículos

From Stealers to Systems:The New Model of Credential Theft

21 de abril de 2026

Tightening security controls and other underground factors are forcing infostealer operations to adapt. TrendAI™ Research explores their evolution into coordinated attack infrastructure and the implications for identity defense.

Leer más  

  • 20 de abril de 2026
    Edge devices have become a primary entry point for state-sponsored espionage, giving attackers a cheaper, faster path to network access, credential theft, and traffic interception. Our report examines the threat landscape, economics, and actor activity driving this shift, along with what CISOs and security leaders can do to respond.
  • 16 de abril de 2026
    AI‑enabled APTs are accelerating attacks, shrinking response windows, and raising the stakes. This report reveals what’s changed and how to defend against it.
  • 10 de abril de 2026
    A jailbreak through sockpuppeting can be easily done as it requires no special tools nor optimization. It only takes a faulty prefill feature, and the gates are open. We tested 11 LLM-powered assistants against sockpuppeting and found varying levels of robustness across today’s leading LLMs.
  • 03 de abril de 2026
    Persistent DNS references to deleted Azure resources create opportunities for attackers to take over trusted endpoints, highlighting a critical risk in cloud infrastructure. TrendAI™ Research discusses six real-world scenarios where attackers could exploit lingering DNS names, allowing them to inherit trust and compromise dependent systems.
  • 31 de marzo de 2026
    TrendAI™ Research has developed a model training procedure for learning an essential representation of prompt injection attacks. The resulting prompt representation exhibits approximately linear separability, allowing the specialized, small-scale classifier trained on features derived from the representation to achieve high classification performance.
  • 30 de marzo de 2026
    Agentic AI marks a fundamental shift that enables autonomous action and decision-making across enterprise systems but also introduces new, complex risks. TrendAI™’s Agentic Governance Gateway empowers organizations to understand, control, and trust agentic AI, ensuring safety and confidence in this new frontier.
  • 26 de marzo de 2026
    In this second installment of a series exploring emerging AI-driven attack surfaces, TrendAI™ Research focuses on employee digital twins: AI replicas of employees that create new vectors for identity compromise, data exfiltration, and persistent access.
  • 25 de marzo de 2026
    Even as AI adoption accelerates, old exploits remain overlooked weaknesses. Underground trends show a renewed demand for exploits, with cybercriminals relying on aging but still effective vulnerabilities. We examine this blind spot and why long-standing issues need to be addressed.
  • 18 de marzo de 2026
    Agenda has rapidly grown into one of the most prolific and dangerous ransomware operations, leveraging advanced techniques, cross-platform variants, and alliances with other major threat groups. Its aggressive double-extortion model and expanding victim base across critical industries make it a serious enterprise risk that demands proactive detection and defense.