Ricerca
- December 16, 2025Trend™ Research introduces a novel system that leverages AI and behavioral analytics to proactively estimate the risk of future malware outbreaks based on users’ behavior to help organizations strategically strengthen their defenses.December 09, 2025We dive into the transformation from “Cybercrime-as-a-Service“ to “Cybercrime-as-a-Sidekick“, which fundamentally alters the operational dynamics of criminal enterprises.November 05, 2025AI’s rapid growth brings new risks as well as opportunities. Strong security foundations are essential to ensure innovation remains safe, compliant, and resilient.October 14, 2025Trend Vision One™ tackles 9 of OWASP’s Top 10 LLM vulnerabilities, offering comprehensive protection against prompt injection, data leakage, AI supply chain risks, and other critical flaws.September 08, 2025Amid the rise of low-code automation, Microsoft Power Automate is becoming an attractive target for cybercriminals exploiting its complexity to evade detection and exfiltrate data – but demand for compromised enterprise assets is outstripping supply in the cybercriminal underground.August 19, 2025This report exposes the life cycle and tactics of task scams by presenting real-world cases as well as strategies to help identify and avoid these threats.August 04, 2025As large language models (LLMs) become more capable and widely adopted, the risk of unintended or adversarial outputs grows, especially within a security-sensitive context. To identify and mitigate such risks, Trend Micro researchers ran LLM security scans that simulate adversarial attacks.August 01, 2025OpenAI recently introduced ChatGPT agent. What are its capabilities and the associated cybersecurity risks? We examined these using Trend Micro’s Digital Assistant Framework to help organizations navigate the changes and risks this new digital assistant may bring.July 28, 2025As agentic AI systems grow increasingly complex, it becomes clear that this class of applications relies on a multi-layered architecture. Trying to chart such architecture reveals several security risks that could plague each layer. This article investigates the possible scenarios and offers actionable insights to secure each layer and combat such threats.