Research, News, and Perspectives (original) (raw)

Artificial Intelligence (AI)

Invisible Prompt Injection: A Threat to AI Security

This article explains the invisible prompt injection, including how it works, an attack scenario, and how users can protect themselves.

Expert Perspective Jan 22, 2025

Expert Perspective Jan 22, 2025

IoT

IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024

Since the end of 2024, we have been continuously monitoring large-scale DDoS attacks orchestrated by an IoT botnet exploiting vulnerable IoT devices such as wireless routers and IP cameras.

Risk Management

Investigating A Web Shell Intrusion With Trend Micro Managed XDR

This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data.

Compliance & Risks

World Tour Survey: Cloud Engineers Wrestle with Risk

Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what cloud security engineers teams had to say.

Malware

Trend Micro Managed XDR Analysis of Infection From Fake Installers and Cracks

Our research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data.

Cyber Threats

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit

Our blog entry discusses a fake PoC exploit for LDAPNightmare (CVE-2024-49113) that is being used to distribute information-stealing malware.

Cloud

2024 Perspective: The Ultimate re:Invent Recap

Ashley & Danielle's Ultimate Recap

Expert Perspective Jan 07, 2025

Expert Perspective Jan 07, 2025

Cyber Threats

Trend Micro Contributes and Maps Container Security to MITRE ATT&CK: A Game-Changer for Cyber Defense

Trend Micro leads the way by mapping its Container Security detection capabilities to the MITRE ATT&CK framework for Containers and contributing real-world attack data.

Exploits & Vulnerabilities

What We Know About CVE-2024-49112 and CVE-2024-49113

This blog entry provides an overview of CVE-2024-49112 and CVE-2024-49113 and includes information that organizations need to know to stay protected against potential exploitation.

Artificial Intelligence (AI)

In this edition of AI Pulse, let's look back at top AI trends from 2024 in the rear view so we can more clearly predicts AI trends for 2025 and beyond.

Expert Perspective Jan 03, 2025

Expert Perspective Jan 03, 2025

No matches found