Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks
Exploits & Vulnerabilities

CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks

Our threat hunters discovered CVE-2024-38112, which was used as a zero-day by APT group Void Banshee, to access and execute files through the disabled Internet Explorer using MSHTML. We promptly identified and reported this zero-day vulnerability to Microsoft, and it has been patched.

July 15, 2024
Artificial Intelligence (AI)

AI Pulse: Brazil Gets Bold with Meta, Interpol’s Red Flag & more

The second edition of AI Pulse is all about AI regulation: what’s coming, why it matters, and what might happen without it. We look at Brazil’s hard não to Meta, how communities are pushing back against AI training data use, Interpol’s warnings about AI deepfakes, and more.

Security Strategies Jul 30, 2024

Save to Folio

Security Strategies Jul 30, 2024

Save to Folio

Artificial Intelligence (AI)

AI-Powered Deepfake Tools Becoming More Accessible Than Ever

Trend Micro research uncovers new cybercrime tools posing increased threats to security, highlighting the rapid evolution of AI-powered hacking services and their potential for mass exploitation

Research Jul 30, 2024

Save to Folio

Research Jul 30, 2024

Save to Folio

Artificial Intelligence (AI)

How to Write a Generative AI Cybersecurity Policy

It’s clear that generative AI is a permanent addition to the enterprise IT toolbox. For CISOs, the pressure is on to roll out AI security policies and technologies that can mitigate very real and present risks.

Security Strategies Jul 29, 2024

Save to Folio

Security Strategies Jul 29, 2024

Save to Folio

Phishing

QR Codes: Convenience or Cyberthreat?

Security awareness and measures to detect and prevent sophisticated risks associated with QR code-based phishing attacks (quishing)

Security Strategies Jul 23, 2024

Save to Folio

Security Strategies Jul 23, 2024

Save to Folio

Cyber Threats

Why NDR is Key to Cyber 'Pest Control'

Intruders are drawn to enterprise IT environments the way mice are attracted to houses. And once either kind of invader is inside, they can be hard to get out. Network detection and response (NDR) lets you trace intruders’ pathways to find out where they’re coming in—and seal the gaps.

Security Strategies Jul 22, 2024

Save to Folio

Security Strategies Jul 22, 2024

Save to Folio

Compliance & Risks

Trend Experts Weigh in on Global IT Outage Caused by CrowdStrike

On July 19, 2024, a large-scale outage emerged affecting Windows computers for many industries across the globe from financial institutions to hospitals to airlines. The source of this outage came from a single content update from CrowdStrike.

Expert Perspective Jul 19, 2024

Save to Folio

Expert Perspective Jul 19, 2024

Save to Folio

Data center

Teaming up with IBM to secure critical SAP workloads

Trend Micro partners with IBM to offer advanced threat detection and response for protecting critical infrastructures running on IBM Power servers

Latest News Jul 16, 2024

Save to Folio

Latest News Jul 16, 2024

Save to Folio