Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
CVE-2025-55182: React2Shell Analysis, Proof-of-Concept Chaos, and In-the-Wild Exploitation
Exploits & Vulnerabilities

CVE-2025-55182: React2Shell Analysis, Proof-of-Concept Chaos, and In-the-Wild Exploitation

CVE-2025-55182 is a CVSS 10.0 pre-authentication RCE affecting React Server Components. Amid the flood of fake proof-of-concept exploits, scanners, exploits, and widespread misconceptions, this technical analysis intends to cut through the noise.

2025/12/10
Compliance & Risks

What Does it Take to Manage Cloud Risk?

Learn why hybrid and multi-cloud environments are vital for IT and business success from our 2025 Trend Micro Defenders Survey.

Annual Predictions 2025/12/22

Save to Folio

Annual Predictions 2025/12/22

Save to Folio

Artificial Intelligence (AI)

What Cyber Defenders Really Think About AI Risk

Learn how Trend Micro's 2025 Trend Micro Defenders Survey Report highlights current AI-related cybersecurity priorities and where security professionals use AI to their advantage.

Annual Predictions 2025/12/18

Save to Folio

Annual Predictions 2025/12/18

Save to Folio

Compliance & Risks

Cyber Risk Management: Defenders Tell It Like It Is

Based on more than 3,000 responses from cybersecurity professionals in nearly 90 countries, our Trend Micro Defenders Survey Report 2025 shines a bright light on the current state of cyber risk management. From the impact of cloud and AI on IT environments to top technical and human challenges, this year’s findings have a lot to say about the pressures security teams are under and what organizations are doing to tighten their grip on cyber risk.

Annual Predictions 2025/12/15

Save to Folio

Annual Predictions 2025/12/15

Save to Folio

Cyber Threats

AI-Automated Threat Hunting Brings GhostPenguin Out of the Shadows

In this blog entry, Trend™ Research provides a comprehensive breakdown of GhostPenguin, a previously undocumented Linux backdoor with low detection rates that was discovered through AI-powered threat hunting and in-depth malware analysis.

Latest News 2025/12/08

Save to Folio

Latest News 2025/12/08

Save to Folio