Новости о безопасности
- 01 de апреля de 2026Persistent DNS references to deleted Azure resources create opportunities for attackers to take over trusted endpoints, highlighting a critical risk in cloud infrastructure. TrendAI™ Research discusses six real-world scenarios where attackers could exploit lingering DNS names, allowing them to inherit trust and compromise dependent systems.
- 31 de марта de 2026TrendAI™ Research has developed a model training procedure for learning an essential representation of prompt injection attacks. The resulting prompt representation exhibits approximately linear separability, allowing the specialized, small-scale classifier trained on features derived from the representation to achieve high classification performance.
- 30 de марта de 2026Agentic AI marks a fundamental shift that enables autonomous action and decision-making across enterprise systems but also introduces new, complex risks. TrendAI™’s Agentic Governance Gateway empowers organizations to understand, control, and trust agentic AI, ensuring safety and confidence in this new frontier.
- 25 de марта de 2026Even as AI adoption accelerates, old exploits remain overlooked weaknesses. Underground trends show a renewed demand for exploits, with cybercriminals relying on aging but still effective vulnerabilities. We examine this blind spot and why long-standing issues need to be addressed.
- 18 de марта de 2026Agenda has rapidly grown into one of the most prolific and dangerous ransomware operations, leveraging advanced techniques, cross-platform variants, and alliances with other major threat groups. Its aggressive double-extortion model and expanding victim base across critical industries make it a serious enterprise risk that demands proactive detection and defense.
- 12 de марта de 2026TrendAI™ Research has discovered several new methods that enable attackers to escape Docker Desktop’s WSL2 VM and run arbitrary code on the host. Our analysis highlights how trusted development tooling can create unexpected attack surfaces when internal APIs and configuration mechanisms are left exposed.
- 05 de марта de 2026TrendAI™ Research has found that user behaviors and machine usage patterns are key drivers of malware risk. This study’s analysis of over 10 million endpoints confirms that risk is highly context-dependent and offers insights into how organizations can pivot to improve their security posture.






It’s By Design: The Use-After-Free of Azure Cloud
Ransomware Spotlight: Agenda
Guarding LLMs With a Layered Prompt Injection Representation