Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Silent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions
Cyber Threats

Silent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions

Trend Micro's Threat Hunting Team has observed EDRSilencer, a red team tool that threat actors are attempting to abuse for its ability to block EDR traffic and conceal malicious activity.

October 15, 2024
Cyber Threats

Attacker Abuses Victim Resources to Reap Rewards from Titan Network

In this blog entry, we discuss how an attacker took advantage of the Atlassian Confluence vulnerability CVE-2023-22527 to connect servers to the Titan Network for cryptomining purposes.

Research Oct 30, 2024

Save to Folio

Research Oct 30, 2024

Save to Folio

Cyber Threats

Understanding the Initial Stages of Web Shell and VPN Threats: An MXDR Analysis

While cyberattacks that employ web shells and VPN compromise are not particularly novel, they are still prevalent. The recent incidents that Trend Micro MXDR analyzed highlight the importance of behavioral analysis and anomaly detection in security measures.

Research Oct 24, 2024

Save to Folio

Research Oct 24, 2024

Save to Folio

Cyber Threats

Unmasking Prometei: A Deep Dive Into Our MXDR Findings

How does Prometei insidiously operate in a compromised system? This Managed Extended Detection and Response investigation conducted with the help of Trend Vision One provides a comprehensive analysis of the inner workings of this botnet so users can stop the threat in its tracks before it inflicts damage to the system.

Research Oct 23, 2024

Save to Folio

Research Oct 23, 2024

Save to Folio

Artificial Intelligence (AI)

5 AI Security Takeaways featuring Forrester

Highlights from the recent discussion between Trend Micro’s David Roth, CRO Enterprise America, and guest speaker Jeff Pollard, VP, Principal Analyst, Forrester about AI hype versus reality and how to secure AI in the workplace.

Security Strategies Oct 17, 2024

Save to Folio

Security Strategies Oct 17, 2024

Save to Folio

Artificial Intelligence (AI)

How to Mitigate the Impact of Rogue AI Risks

This is the latest blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights.

Expert Perspective Oct 17, 2024

Save to Folio

Expert Perspective Oct 17, 2024

Save to Folio

Ransomware

Fake LockBit, Real Damage: Ransomware Samples Abuse AWS S3 to Steal Data

This article uncovers a Golang ransomware abusing AWS S3 for data theft, and masking as LockBit to further pressure victims. The discovery of hard-coded AWS credentials in these samples led to AWS account suspensions.

Research Oct 16, 2024

Save to Folio

Research Oct 16, 2024

Save to Folio