Trend Micro Research (@trendmicrorsrch) 's Twitter Profile
Trend Micro Research

@trendmicrorsrch

Security research, news, and information direct from @TrendMicro experts.

ID: 11927342

linkhttps://research.trendmicro.com/2023AnnualReport calendar_today07-01-2008 03:18:07

27,27K Tweet

52,52K Followers

384 Following

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

Navigating the digital landscape during geopolitical conflicts requires more than just resilience — it demands foresight. Learn how #CISOs can proactively prepare and protect their organizations against emerging threats: ⬇️ research.trendmicro.com/4cuB5Na

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

How secure is your metrics endpoint in cAdvisor? Our article provides valuable defensive measures to protect your systems. Find out more here: ⬇️ research.trendmicro.com/3y4qURp

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

APT41-linked threat actor Earth Baku leverages tools like the custom iox, Rakshasa, and Tailscale during post-exploitation. Persistent control and efficient data exfiltration are key to their operations. Our blog entry has the details: ⬇️ research.trendmicro.com/3SGLD4S

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

As businesses explore #AI technologies, missteps are inevitable and may create fresh opportunities for criminal elements. Read our midyear report to strengthen your defenses and stay ahead of emerging threats:⬇️ research.trendmicro.com/2024midyearrep…

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

In times of global conflicts and disruptions, #CISOs aren’t just gatekeepers — they’re the front-line defense. Let our practical guide help you steer your #cybersecurity strategy through geopolitical storms:⬇️ research.trendmicro.com/4cuB5Na

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

CVE-2023-22527 in Atlassian’s Confluence Data Center and Server is a ticking time bomb. Our technical analysis reveals how it's being weaponized for cryptomining. Get the full story here:⬇️ research.trendmicro.com/4dFBePo

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

Rapid deployment cycles heighten the risk of cloud security misconfigurations. An Environmental, Social, and Governance (ESG) survey shows 85% of organizations deploy new builds weekly, often prioritizing functionality over security. Learn more here: research.trendmicro.com/3ABK1TC

Rapid deployment cycles heighten the risk of cloud security misconfigurations. An Environmental, Social, and Governance (ESG) survey shows 85% of organizations deploy new builds weekly, often prioritizing functionality over security.
 
Learn more  here: research.trendmicro.com/3ABK1TC
Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

Learn about the critical #OpenSSH vulnerabilities CVE-2024-6387 and CVE-2024-6409 disclosed earlier this month. Stay ahead with our detailed analysis. Click here for the report: ⬇️ research.trendmicro.com/3WbPyYb

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

Play ransomware group broadens its targets with a new Linux variant focusing on #ESXi. Learn about their evasion techniques and possible Prolific Puma ties in our blog. Read here: ⬇️ research.trendmicro.com/4bOBppQ

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

While there are risks in applying GPTs and LLMs in your workforce, proper awareness and mitigation tactics such as being vigilant to what AI says and verifying the information given is paramount to safe usage of such tools. Read more in our blog here:⬇️ research.trendmicro.com/3Wtw0iq

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

Hijacked social media accounts lead to the installation of endpoint management software disguised as AI tools. This allows attackers to remotely control devices. Find out more: ⬇️ research.trendmicro.com/4fqg5Kj

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

APT41-linked threat actor Earth Baku now targets Europe, the Middle East, and Africa, with a focus on government, healthcare, telecom, and education sectors. New targets include Italy, Germany, UAE, Qatar. Find out more here:⬇️ research.trendmicro.com/3SGLD4S

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

Trend Vision One now collects #CloudTrail logs from AWS accounts, enhancing visibility for easier threat detection. Discover the various threat scenarios in our report:⬇️ research.trendmicro.com/3LOUBsZ

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

Deepfake technology is being used to bypass Know-Your-Customers (KYC) verification systems. Learn how to protect your financial institution in our research:⬇️ research.trendmicro.com/GenAIAbuse

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

CISOs must understand the risk of data extraction and disruptions to critical IoT-dependent business processes. Read more to find out how IoT devices could be compromised: ⬇️ research.trendmicro.com/unwired

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

IoT threats aren't new but the evolving TTPs of threat actors are leading to an ongoing paradigm shift. Learn more: ⬇️ research.trendmicro.com/unwired

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

Attackers are using paid ads on hijacked social media pages to promote fake AI photo editors and steal sensitive data. Be aware of this new scam! Here’s what you need to know: ⬇️ research.trendmicro.com/4fqg5Kj

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

Explore how Vision One can provide various detections and protect AWS accounts. Our report details real-world AWS attack scenarios under different MITRE cloud tactics. Stay ahead of cybercriminals. Read more:⬇️ research.trendmicro.com/3LOUBsZ

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

Data poisoning will remain relevant as it will be one of the attack vectors used in LLMs. Being one step ahead is vital to ensure security. Find out more in our blog: ⬇️ research.trendmicro.com/3Wtw0iq

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

Deepfake apps are becoming more accessible, opening the door to a new wave of cybercrime. Stay updated with our research:⬇️ research.trendmicro.com/GenAIAbuse