Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices
IoT

Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices

In this blog entry, we discuss Water Barghest's exploitation of IoT devices, transforming them into profitable assets through advanced automation and monetization techniques.

November 18, 2024
Malware

Gafgyt Malware Broadens Its Scope in Recent Attacks

Our researchers identified threat actors exploiting misconfigured Docker servers to spread the Gafgyt malware. This threat traditionally targets IoT devices; this new tactic signals a change in its behavior.

Research Dec 03, 2024

Save to Folio

Research Dec 03, 2024

Save to Folio

Compliance & Risks

World Tour Survey: IT Operations’ Hands-on Defense

Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what IT operations teams had to say.

Research Dec 02, 2024

Save to Folio

Research Dec 02, 2024

Save to Folio

Artificial Intelligence (AI)

AI Pulse: The Good from AI and the Promise of Agentic

The perils of AI get a lot of airtime, but what are the upsides? This issue of AI Pulse looks at some of the good AI can bring, from strengthening cybersecurity to driving health breakthroughs—and how the coming wave of agentic AI is going to take those possibilities to a whole new level.

Latest News Dec 01, 2024

Save to Folio

Latest News Dec 01, 2024

Save to Folio

Privacy & Risks

Embracing a Risk-Based Cybersecurity Approach With ASRM

Explore how a risk-based cybersecurity approach is critical to proactively stopping dynamic, ever-evolving threats

Expert Perspective Nov 25, 2024

Save to Folio

Expert Perspective Nov 25, 2024

Save to Folio

APT & Targeted Attacks

Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions

Since 2023, APT group Earth Estries has aggressively targeted key industries globally with sophisticated techniques and new backdoors, like GHOSTSPIDER and MASOL RAT, for prolonged espionage operations.

Latest News Nov 25, 2024

Save to Folio

Latest News Nov 25, 2024

Save to Folio

Artificial Intelligence (AI)

5 AI Security Takeaways featuring Forrester

Highlights from the recent discussion between Trend Micro’s David Roth, CRO Enterprise America, and guest speaker Jeff Pollard, VP, Principal Analyst, Forrester about AI hype versus reality and how to secure AI in the workplace.

Security Strategies Nov 13, 2024

Save to Folio

Security Strategies Nov 13, 2024

Save to Folio