❌

Normal view

There are new articles available, click to refresh the page.
Today β€” 8 December 2025Trend Micro Research News

AI-Automated Threat Hunting Brings GhostPenguin Out of the Shadows

7 December 2025 at 19:00
In this blog entry, Trendβ„’ Research provides a comprehensive breakdown of GhostPenguin, a previously undocumented Linux backdoor with low detection rates that was discovered through AI-powered threat hunting and in-depth malware analysis.

Before yesterdayTrend Micro Research News

Critical React Server Components Vulnerability CVE-2025-55182: What Security Teams Need to Know

4 December 2025 at 19:00
CVE-2025-55182 is a critical (CVSS 10.0) pre-authentication remote code execution vulnerability affecting React Server Components used in React.js, Next.js, and related frameworks (see the context section for a more exhaustive list of affected frameworks).

Project View: A New Era of Prioritized and Actionable Cloud Security

3 December 2025 at 19:00
In today's cloud-first world, security teams face an overwhelming flood of alerts, fragmented visibility, and reactive workflows. The complexity of modern cloud environmentsβ€”spanning multi-cloud deployments, ephemeral assets, and decentralized ownershipβ€”demands a new approach to risk management.

Unraveling Water Saci's New Multi-Format, AI-Enhanced Attacks Propagated via WhatsApp

Through AI-driven code conversion and a layered infection chain involving different file formats and scripting languages, the threat actors behind Water Saci are quickly upgrading their malware delivery and propagation methods across WhatsApp in Brazil.

Shai-hulud 2.0 Campaign Targets Cloud and Developer Ecosystems

Shai-hulud 2.0 campaign features a sophisticated variant capable of stealing credentials and secrets from major cloud platforms and developer services, while automating the backdooring of NPM packages maintained by victims. Its advanced tactics enable rapid, stealthy propagation across the software supply chain, putting countless downstream users at risk.

Breaking Down S3 Ransomware: Variants, Attack Paths and Trend Vision Oneβ„’ Defenses

17 November 2025 at 19:00
In this blog entry, Trendβ„’ Research explores how ransomware actors are shifting their focus to cloud-based assets, including the tactics used to compromise business-critical data in AWS environments.

Increase in Lumma Stealer Activity Coincides with Use of Adaptive Browser Fingerprinting Tactics

In this blog entry, Trendβ„’ Research analyses the layered command-and-control approaches that Lumma Stealer uses to maintain its ongoing operations while enhancing collection of victim-environment data.

Active Water Saci Campaign Spreading Via WhatsApp Features Multi-Vector Persistence and Sophisticated C&C

Continuous investigation on the Water Saci campaign reveals innovative email-based C&C system, multi-vector persistence, and real-time command capabilities that allow attackers to orchestrate coordinated botnet operations, gather detailed campaign intelligence, and dynamically control malware activity across multiple infected machines.

The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns

Trendβ„’ Research examines the complex collaborative relationship between China-aligned APT groups via the new β€œPremier Pass-as-a-Service” model, exemplified by the recent activities of Earth Estries and Earth Naga.

❌
❌