❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Key Insights on SHADOW-AETHER-015 and Earth Preta from the 2025 MITRE ATT&CK Evaluation with TrendAI Vision Oneβ„’

12 January 2026 at 19:00
This blog discusses notable modern TTPs observed from SHADOW-AETHER-015 and Earth Preta, from TrendAIβ„’ Research monitoring and TrendAI Vision Oneβ„’ intelligence. These findings support the performance of TrendAIβ„’ in the 2025 MITRE ATT&CK Evaluations.

Get Executives on board with managing Cyber Risk

28 December 2025 at 19:00
Learn how the 2025 Trend Micro Defenders Survey Report helps paint a clear picture of how security teams are looking to work with executive leaders to manage cyber risk.

What Cyber Defenders Really Think About AI Risk

17 December 2025 at 19:00
Learn how Trend Micro's 2025 Trend Micro Defenders Survey Report highlights current AI-related cybersecurity priorities and where security professionals use AI to their advantage.

Redefining Enterprise Defense in the Era of AI-Led Cyberattacks

13 November 2025 at 19:00
More cybercriminals are turning to using autonomous AI tools to upgrade their attacks, as exemplified by the recent utilization of Anthropic’s Claude Code, prompting an urgent need for enterprises to adopt agentic AI-driven security platforms and proactive defenses to counter AI-related threats.

Shai-hulud 2.0 Campaign Targets Cloud and Developer Ecosystems

Shai-hulud 2.0 campaign features a sophisticated variant capable of stealing credentials and secrets from major cloud platforms and developer services, while automating the backdooring of NPM packages maintained by victims. Its advanced tactics enable rapid, stealthy propagation across the software supply chain, putting countless downstream users at risk.

Increase in Lumma Stealer Activity Coincides with Use of Adaptive Browser Fingerprinting Tactics

In this blog entry, Trendβ„’ Research analyses the layered command-and-control approaches that Lumma Stealer uses to maintain its ongoing operations while enhancing collection of victim-environment data.

The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns

Trendβ„’ Research examines the complex collaborative relationship between China-aligned APT groups via the new β€œPremier Pass-as-a-Service” model, exemplified by the recent activities of Earth Estries and Earth Naga.

❌
❌