We have developed a machine learning model called TrendX Hybrid Model that uses two training phases — pre-training and training — and allows us to correlate static and behavior features to improve detection rates and reduce false positives.
Researchers discovered a vulnerability in Amazon’s Ring Video Doorbell Pro that, if exploited, could allow a threat actor to get network or Wi-Fi credentials.
An Android bug allows threat actors to transfer a malicious application to a nearby Near Field Communication (NFC)-enabled device via the Android Beam.
Details on the proof-of-concept (PoC) exploit for two unpatched, critical remote code execution (RCE) vulnerabilities in the network configuration management utility rConfig have been recently disclosed.
Ransomware made headlines again, starting with a campaign that hit companies in Spain, including Cadena SER, the country’s largest radio network. In another part of the globe, threat actors managed to infect government systems in Nunavut.
Patch now: Two Chrome zero-days were reported, one of them actively exploited in a campaign. Meanwhile, BlueKeep was initially reported seen in the wild to install a malicious Monero miner.
Almost 4,000 domains and 62 phishing kit variants used to target Microsoft users were uncovered within an observation window of 262 days, according to new report.
Trend Micro’s Zero Day Initiative (ZDI) will bring industrial control system (ICS) hacking into the Pwn2Own competition. The categories will be based on how widely used the system is and the relevance to researchers and the ICS community.