Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin
Exploits y vulnerabilidades

CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin

Trend Research identified Russian threat actor Water Gamayun exploiting CVE-2025-26633, a zero-day vulnerability in the Microsoft Management Console that attackers exploit to execute malicious code and exfiltrate data.

March 25, 2025
Cumplimiento de normativa y riesgos

CTEM + CREM: Aligning Your Cybersecurity Strategy

Cyber threats evolve daily, and organizations need to move beyond traditional security approaches to stay ahead. That’s why Continuous Threat Exposure Management (CTEM), a concept introduced by Gartner, has been gaining traction. CTEM isn’t just another cybersecurity buzzword; it’s a structured, continuous program designed to help organizations identify, assess, and mitigate security risks proactively. If you’re considering implementing a CTEM program, Trend Vision One TM Cyber Risk Exposure Management (CREM) solution—formerly known as Attack Surface Risk Management (ASRM)—can give you a significant head start.

Expert Perspective Apr 08, 2025

Save to Folio

Expert Perspective Apr 08, 2025

Save to Folio

Inteligencia artificial (IA)

GTC 2025: AI, Security & The New Blueprint

From quantum leaps to AI factories, GTC 2025 proved one thing: the future runs on secure foundations.

Expert Perspective Apr 07, 2025

Save to Folio

Expert Perspective Apr 07, 2025

Save to Folio

Inteligencia artificial (IA)

Capacity is Critical in Riskier Threat Landscape

International cooperation, reporting, and capacity building are critical to enhance cybersecurity defenses. Effective governance in an increasingly risky landscape requires visibility as well as coordinated vulnerability disclosure.

Expert Perspective Apr 04, 2025

Save to Folio

Expert Perspective Apr 04, 2025

Save to Folio

APT y ataques dirigidos

The Espionage Toolkit of Earth Alux: A Closer Look at its Advanced Techniques

The cyberespionage techniques of Earth Alux, a China-linked APT group, are putting critical industries at risk. The attacks, aimed at the APAC and Latin American regions, leverage powerful tools and techniques to remain hidden while stealing sensitive data.

Research Mar 31, 2025

Save to Folio

Research Mar 31, 2025

Save to Folio

Exploits y vulnerabilidades

A Deep Dive into Water Gamayun’s Arsenal and Infrastructure

Trend Research discusses the delivery methods, custom payloads, and techniques used by Water Gamayun, the suspected Russian threat actor abusing a zero-day vulnerability in the Microsoft Management Console framework (CVE-2025-26633) to execute malicious code on infected machines.

Research Mar 28, 2025

Save to Folio

Research Mar 28, 2025

Save to Folio

Inteligencia artificial (IA)

Trend Cybertron: Full Platform or Open-Source?

Previously exclusive to Trend Vision One customers, select Trend Cybertron models, datasets and agents are now available via open-source. Build advanced security solutions and join us in developing the next generation of AI security technology.

Latest News Mar 27, 2025

Save to Folio

Latest News Mar 27, 2025

Save to Folio

Exploits y vulnerabilidades

CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin

Trend Research identified Russian threat actor Water Gamayun exploiting CVE-2025-26633, a zero-day vulnerability in the Microsoft Management Console that attackers exploit to execute malicious code and exfiltrate data.

Research Mar 25, 2025

Save to Folio

Research Mar 25, 2025

Save to Folio