Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
How Ransomhub Ransomware Uses EDRKillShifter to Disable EDR and Antivirus Protections
Ransomware

How Ransomhub Ransomware Uses EDRKillShifter to Disable EDR and Antivirus Protections

Trend Micro tracked this group as Water Bakunawa, behind the RansomHub ransomware, employs various anti-EDR techniques to play a high-stakes game of hide and seek with security solutions.

September 20, 2024
Artificial Intelligence (AI)

AI Pulse: What's new in AI regulations?

Fall is in the air and frameworks for mitigating AI risk are dropping like leaves onto policymakers’ desks. From California’s SB 1047 bill and NIST’s model-testing deal with OpenAI and Anthropic to REAIM’s blueprint for military AI governance, AI regulation is proving to be a hot and complicated topic.

Latest News Sep 30, 2024

Save to Folio

Latest News Sep 30, 2024

Save to Folio

Malware

MDR in Action: Preventing The More_eggs Backdoor From Hatching

Trend Micro MDR (Managed Detection and Response) team promptly mitigated a more_eggs infection. Using Vision One, MDR illustrated how Custom Filters/Models and Security Playbook can be used to automate the response to more_eggs and similar threats.

Sep 30, 2024

Save to Folio

Sep 30, 2024

Save to Folio

Artificial Intelligence (AI)

Trend Detects NVIDIA AI Toolkit Vulnerability

On Wednesday, NVIDIA released updates to fix a critical vulnerability in its NVIDIA Container Toolkit, which, if exploited, could put a wide range of AI infrastructure and underlying data/secrets at risk.

Sep 27, 2024

Save to Folio

Sep 27, 2024

Save to Folio

Cyber Threats

Inaugural World Tour 2024 Survey Findings

Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what CISOs had to say.

Reports Sep 26, 2024

Save to Folio

Reports Sep 26, 2024

Save to Folio

Privacy & Risks

Cybersecurity Compass: Bridging the Communication Gap

Discover how to use the Cybersecurity Compass to foster effective conversations about cybersecurity strategy between non-technical and technical audiences, focusing on the phases of before, during, and after a breach.

Security Strategies Sep 26, 2024

Save to Folio

Security Strategies Sep 26, 2024

Save to Folio

Artificial Intelligence (AI)

Identifying Rogue AI

This is the third blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights.

Expert Perspective Sep 19, 2024

Save to Folio

Expert Perspective Sep 19, 2024

Save to Folio

APT & Targeted Attacks

Earth Baxia Uses Spear-Phishing and GeoServer Exploit to Target APAC

We observed Earth Baxia carrying out targeted attacks against APAC countries that involved advanced techniques like spear-phishing and customized malware, with data suggesting that the group operates from China.

Sep 19, 2024

Save to Folio

Sep 19, 2024

Save to Folio

Exploits & Vulnerabilities

Vulnerabilities in Cellular Packet Cores Part IV: Authentication

Our research reveals two significant vulnerabilities in Microsoft Azure Private 5G Core (AP5GC), both of which have now been resolved and are discussed in this blog post.

Research Sep 18, 2024

Save to Folio

Research Sep 18, 2024

Save to Folio