Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Update Now: PaperCut Vulnerability CVE-2023-27350 Under Active Exploitation
Exploity i luki w zabezpieczeniach

Update Now: PaperCut Vulnerability CVE-2023-27350 Under Active Exploitation

Two vulnerabilities in PaperCut have been found, and one of them is being actively exploited in the wild. This blog entry provides a summary of the vulnerabilities, and includes security guidance for IT and SOC professionals.

April 26, 2023
Złośliwe oprogramowanie

How Cracks and Installers Bring Malware to Your Device

Our research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data.

Research Jan 10, 2025

Save to Folio

Research Jan 10, 2025

Save to Folio

Exploity i luki w zabezpieczeniach

What We Know About CVE-2024-49112 and CVE-2024-49113

This blog entry provides an overview of CVE-2024-49112 and CVE-2024-49113 and includes information that organizations need to know to stay protected against potential exploitation.

Research Jan 04, 2025

Save to Folio

Research Jan 04, 2025

Save to Folio

Sztuczna inteligencja (AI)

AI Pulse: Top AI Trends from 2024 - A Look Back

In this edition of AI Pulse, let's look back at top AI trends from 2024 in the rear view so we can more clearly predicts AI trends for 2025 and beyond.

Expert Perspective Jan 03, 2025

Save to Folio

Expert Perspective Jan 03, 2025

Save to Folio

Zgodność z przepisami i ryzyko

FedRAMP ATO Boosts Zero Trust for Federal Agencies

Trend Vision One™ for Government has obtained a FedRAMP Authorization to Operate (ATO). This milestone enables Federal government customers to leverage Trend’s platform to rapidly stop adversaries and control their cybersecurity risk posture.

Latest News Dec 19, 2024

Save to Folio

Latest News Dec 19, 2024

Save to Folio

Złośliwe oprogramowanie

Python-Based NodeStealer Version Targets Facebook Ads Manager

In this blog entry, Trend Micro’s Managed XDR team discusses their investigation into how the latest variant of NodeStealer is delivered through spear-phishing attacks, potentially leading to malware execution, data theft, and the exfiltration of sensitive information via Telegram.

Research Dec 19, 2024

Save to Folio

Research Dec 19, 2024

Save to Folio

Sztuczna inteligencja (AI)

Link Trap: GenAI Prompt Injection Attack

Prompt injection exploits vulnerabilities in generative AI to manipulate its behavior, even without extensive permissions. This attack can expose sensitive data, making awareness and preventive measures essential. Learn how it works and how to stay protected.

Security Strategies Dec 17, 2024

Save to Folio

Security Strategies Dec 17, 2024

Save to Folio