Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Policy Shortfalls Put UK Public Sector Cybersecurity at Risk
Cyber Risk

Policy Shortfalls Put UK Public Sector Cybersecurity at Risk

Our latest research reveals that fragmented regulatory guidance and unclear internal policies are leaving UK public sector organisations increasingly exposed to cyber threats.

February 26, 2025
Exploits & Vulnerabilities

A Deep Dive into Water Gamayun’s Arsenal and Infrastructure

Trend Research discusses the delivery methods, custom payloads, and techniques used by Water Gamayun, the suspected Russian threat actor abusing a zero-day vulnerability in the Microsoft Management Console framework (CVE-2025-26633) to execute malicious code on infected machines.

Research Mar 28, 2025

Save to Folio

Research Mar 28, 2025

Save to Folio

Artificial Intelligence (AI)

Trend Cybertron: Full Platform or Open-Source?

Previously exclusive to Trend Vision One customers, select Trend Cybertron models, datasets and agents are now available via open-source. Build advanced security solutions and join us in developing the next generation of AI security technology.

Latest News Mar 27, 2025

Save to Folio

Latest News Mar 27, 2025

Save to Folio

Exploits & Vulnerabilities

CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin

Trend Research identified Russian threat actor Water Gamayun exploiting CVE-2025-26633, a zero-day vulnerability in the Microsoft Management Console that attackers exploit to execute malicious code and exfiltrate data.

Research Mar 25, 2025

Save to Folio

Research Mar 25, 2025

Save to Folio

Cyber Threats

AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution

In this blog entry, we uncovered a campaign that uses fake GitHub repositories to distribute SmartLoader, which is then used to deliver Lumma Stealer and other malicious payloads. The campaign leverages GitHub’s trusted reputation to evade detection, using AI-generated content to make fake repositories appear legitimate.

Research Mar 11, 2025

Save to Folio

Research Mar 11, 2025

Save to Folio

Cyber Threats

From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario

Trend Micro™ Managed XDR assisted in an investigation of a B2B BEC attack that unveiled an entangled mesh weaved by the threat actor with the help of a compromised server, ensnaring three business partners in a scheme that spanned for days. This article features investigation insights, a proposed incident timeline, and recommended security practices.

Research Mar 05, 2025

Save to Folio

Research Mar 05, 2025

Save to Folio