โŒ

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Shai-hulud 2.0 Campaign Targets Cloud and Developer Ecosystems

Shai-hulud 2.0 campaign features a sophisticated variant capable of stealing credentials and secrets from major cloud platforms and developer services, while automating the backdooring of NPM packages maintained by victims. Its advanced tactics enable rapid, stealthy propagation across the software supply chain, putting countless downstream users at risk.

Increase in Lumma Stealer Activity Coincides with Use of Adaptive Browser Fingerprinting Tactics

In this blog entry, Trendโ„ข Research analyses the layered command-and-control approaches that Lumma Stealer uses to maintain its ongoing operations while enhancing collection of victim-environment data.

The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns

Trendโ„ข Research examines the complex collaborative relationship between China-aligned APT groups via the new โ€œPremier Pass-as-a-Serviceโ€ model, exemplified by the recent activities of Earth Estries and Earth Naga.

Shifts in the Underground: The Impact of Water Kuritaโ€™s (Lumma Stealer) Doxxing

A targeted underground doxxing campaign exposed alleged core members of Lumma Stealer (Water Kurita), resulting in a sharp decline in its activity and a migration of customers to rival infostealer platforms.

Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits

14 October 2025 at 20:00
Trendโ„ข Research has uncovered an attack campaign exploiting the Cisco SNMP vulnerability CVE-2025-20352, allowing remote code execution and rootkit deployment on unprotected devices, with impacts observed on Cisco 9400, 9300, and legacy 3750G series.

RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits

Trendโ„ข Research and ZDI Threat Hunters have identified a large-scale RondoDox botnet campaign exploiting over 50 vulnerabilities across more than 30 vendors, including flaws first seen in Pwn2Own contests.

This Is How Your LLM Gets Compromised

23 September 2025 at 20:00
Poisoned data. Malicious LoRAs. Trojan model files. AI attacks are stealthier than everโ€”often invisible until itโ€™s too late. Hereโ€™s how to catch them before they catch you.

What We Know About the NPM Supply Chain Attack

Trendโ„ข Research outlines the critical details behind the ongoing NPM supply chain attack and offers essential steps to stay protected against potential compromise.

โŒ
โŒ