Identity Protection in the AI Era
Identity has become the primary attack surface in modern enterprises. As organizations expand across cloud platforms, SaaS ecosystems, and distributed...
Identity has become the primary attack surface in modern enterprises. As organizations expand across cloud platforms, SaaS ecosystems, and distributed...
The first quarter of 2026 has reinforced a hard truth: U.S. government agencies and educational institutions are operating in the...
Key takeaways: Attackers rapidly leveraged the Claude Code packaging error incident to distribute credential-stealing malware using fake GitHub repositories. This demonstrates how quickly threat actors can...
While the immediate threat is the social engineering campaign delivering Vidar, the leaked source code itself presents a distinct and...
TrendAI would like to commend the White House Office of the National Cyber Director (ONCD), led by Sean Cairncross, and...
The ownership problem no one talks about One of the biggest risks in vibe coding isn’t that nobody owns the...
TrendAI™ Research at RSAC 2026: Advancing Defense Across AI‑Driven and Cyber‑Physical Threats | Trend Micro (US) Content has been added...
The Telnyx compromise indicates a continued change in the techniques used in TeamPCP’s supply‑chain activity, with adjustments to tooling, delivery...
Attribution analysis Based on technical artifacts, infrastructure overlaps, and victimology, TrendAI™ Research attributes this campaign to Pawn Storm with high confidence. This...
The infection begins when the victim manually executes a file disguised as a legal notice: Dokumentation über Verstöße gegen Rechte...
Electric power infrastructure is becoming more connected than ever before. Organizations responsible for operating the Bulk Electric System (BES) are...
Serious fraud and cybercrime know no boundaries — jurisdictional or otherwise. Criminal gangs operate with impunity across borders, often leaving...
Following initial access, the threat actors conducted extensive lateral movement using a combination of legitimate administration tools and credential abuse....
While the execution of the bytecode was not successful in our tests, we saw that it contains strings and a...
The viral rise of OpenClaw (formerly Clawdbot) marks the end of the "chatbot" era and the beginning of the "sovereign...