Informazioni sulla sicurezza
- 31 marzo 2026TrendAI™ Research has developed a model training procedure for learning an essential representation of prompt injection attacks. The resulting prompt representation exhibits approximately linear separability, allowing the specialized, small-scale classifier trained on features derived from the representation to achieve high classification performance.
- 30 marzo 2026Agentic AI marks a fundamental shift that enables autonomous action and decision-making across enterprise systems but also introduces new, complex risks. TrendAI™’s Agentic Governance Gateway empowers organizations to understand, control, and trust agentic AI, ensuring safety and confidence in this new frontier.
- 18 marzo 2026Agenda has rapidly grown into one of the most prolific and dangerous ransomware operations, leveraging advanced techniques, cross-platform variants, and alliances with other major threat groups. Its aggressive double-extortion model and expanding victim base across critical industries make it a serious enterprise risk that demands proactive detection and defense.
- 12 marzo 2026TrendAI™ Research has discovered several new methods that enable attackers to escape Docker Desktop’s WSL2 VM and run arbitrary code on the host. Our analysis highlights how trusted development tooling can create unexpected attack surfaces when internal APIs and configuration mechanisms are left exposed.
- 05 marzo 2026TrendAI™ Research has found that user behaviors and machine usage patterns are key drivers of malware risk. This study’s analysis of over 10 million endpoints confirms that risk is highly context-dependent and offers insights into how organizations can pivot to improve their security posture.
- 03 marzo 2026AI systems were ground zero for cyber risk in the second half of 2025: Critical flaws were on the rise and adversaries targeted every layer of the AI stack. As underlying weaknesses across the ecosystem continue to widen, organizations must adopt a vigilant, AI-first approach to defense.






Cracking the Isolation: Novel Docker Desktop VM Escape Techniques Under WSL2
Ransomware Spotlight: Agenda
Guarding LLMs With a Layered Prompt Injection Representation