<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:trendmicro="https://www.trendmicro.com" version="2.0">
  <channel>
    <title>Trend Micro Research, News, Perspectives</title>
    <description></description>
    <link>https://www.trendmicro.com/en_us/research.html</link>
    <xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item>
      <title>Analyzing Void Dokkaebi’s Cython-Compiled InvisibleFerret Malware</title>
      <description>Void Dokkaebi, a North Korea-aligned intrusion set, has updated its information-stealing malware, InvisibleFerret, shifting its delivery format to evade script-based detections.</description>
      <link>https://www.trendmicro.com/en_us/research/26/e/analyzing-void-dokkaebi-invisibleferret-malware.html</link>
      <pubDate>Fri, 22 May 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Kazuki Fujisawa</name>
          <title>Sr. Security Specialist</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Kazuki Fujisawa</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/void-dokkaebi-2-cover:Large?qlt=80"/>
    </item>
    <item>
      <title>Inside SHADOW-WATER-063’s Banana RAT: From Build Server to Banking Fraud</title>
      <description>In this blog entry, researchers from the TrendAI™ MDR team discuss how they mapped the full end-to-end operation of SHADOW-WATER-063’s Banana RAT banking malware by analyzing server-side artifacts and victim-side data. </description>
      <link>https://www.trendmicro.com/en_us/research/26/e/banana-rat.html</link>
      <pubDate>Tue, 19 May 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Aldrin Ceriola</name>
          <title>Incident Response Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Gabriel Nicoleta</name>
          <title>Sr. Security Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jovit Samaniego</name>
          <title>Incident Response Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Mohamed Fahmy</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Aldrin Ceriola</dc:creator>
      <dc:creator>Gabriel Nicoleta</dc:creator>
      <dc:creator>Jovit Samaniego</dc:creator>
      <dc:creator>Mohamed Fahmy</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/BananaRAT_thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>Agentic Governance: Why It Matters Now</title>
      <description>AI agents now act inside the trust boundary with real credentials, and agentic governance is what keeps them from quietly breaking things at machine speed.</description>
      <link>https://www.trendmicro.com/en_us/research/26/e/agentic-governance-why-it-matters-now.html</link>
      <pubDate>Mon, 18 May 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Fernando Tucci</name>
          <title>Senior Product Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Fernando Tucci</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/bearded-man-presenting-ai-976x533:Large?qlt=80"/>
    </item>
    <item>
      <title>Analyzing TeamPCP’s Supply Chain Attacks: Checkmarx KICS and elementary-data in CI/CD Credential Theft</title>
      <description>Our research examines the April 22 Checkmarx KICS and April 24 elementary-data incidents as part of a broader TeamPCP supply chain campaign. Across both cases, the actor abused trusted CI/CD and release workflows to steal credentials at scale.</description>
      <link>https://www.trendmicro.com/en_us/research/26/e/analyzing-teampcp-supply-chain-attacks.html</link>
      <pubDate>Wed, 13 May 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jacob Santos</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>John Rainier Navato</name>
          <title>Senior Threat Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jacob Santos</dc:creator>
      <dc:creator>John Rainier Navato</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/thumbnail_976x533:Large?qlt=80"/>
    </item>
    <item>
      <title>Vibe Hacking: Two AI-Augmented Campaigns Target Government and Financial Sectors in Latin America </title>
      <description>TrendAI™ Research has identified two emerging threat campaigns—SHADOW-AETHER-040 and SHADOW-AETHER-064—that use agentic AI to drive intrusion operations against government and financial organizations in Latin America, marking these among the first cases we have observed of AI agents executing attacks from initial access to data exfiltration.</description>
      <link>https://www.trendmicro.com/en_us/research/26/e/vibe-hacking-two-ai-augmented-campaigns-target-government-and-financial-sectors-in-latin-america.html</link>
      <pubDate>Mon, 11 May 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Joseph C Chen</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Joseph C Chen</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/vibe-hacking-two-ai-augmented-campaigns:Large?qlt=80"/>
    </item>
    <item>
      <title>What Is the Instructure Canvas Breach? Impact, Risks, and What Institutions Should Do </title>
      <description>The Instructure Canvas breach affects universities, K–12 school districts, and teaching hospitals globally. This blog entry intends to provide context and practical guidance.</description>
      <link>https://www.trendmicro.com/en_us/research/26/e/What-Is-the-Instructure-Canvas-Breach.html</link>
      <pubDate>Sun, 10 May 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Johnny Hand</name>
          <title>VP, AI Operational Excellence</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Johnny Hand</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/instructure-canvas-breach-thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>Supporting the National Cyber Strategy: How TrendAI™ Helps</title>
      <description>A deeper look at the first three pillars and outlining how our capabilities directly support government agencies working to bring this strategy to life.</description>
      <link>https://www.trendmicro.com/en_us/research/26/e/national-cyber-strategy.html</link>
      <pubDate>Wed, 6 May 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jon Clay</name>
          <title>VP, Threat Intelligence</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jon Clay</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <category>Trend Micro Research : Data center</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Network</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/supporting-the-national-cyber-strategy-blog:Large?qlt=80"/>
    </item>
    <item>
      <title>InstallFix and Claude Code: How Fake Install Pages Lead to Real Compromise</title>
      <description>Targeting multiple industries worldwide, the InstallFix campaign uses fake Claude AI installer pages to trick users into running malware that collects system information, disables security features, achieves persistence, and connects to attacker-controlled C&amp;C servers for additional payloads.</description>
      <link>https://www.trendmicro.com/en_us/research/26/e/installfix-and-claude-code.html</link>
      <pubDate>Tue, 5 May 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Allixon Kristoffer Francisco</name>
          <title>Threat Intel Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Gabriel Nicoleta</name>
          <title>Sr. Security Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jonna Santos</name>
          <title>Sr. Security Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Mohamed Fahmy</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Allixon Kristoffer Francisco</dc:creator>
      <dc:creator>Gabriel Nicoleta</dc:creator>
      <dc:creator>Jonna Santos</dc:creator>
      <dc:creator>Mohamed Fahmy</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/installfix_thunbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>Quasar Linux (QLNX) – A Silent Foothold in the Supply Chain: Inside a Full-Featured Linux RAT With Rootkit, PAM Backdoor, Credential Harvesting Capabilities</title>
      <description>TrendAI™ Research breaks down Quasar Linux (QLNX), a previously undocumented sophisticated Linux RAT with low detection rates. In this blog, we examine a full-featured Linux threat incorporating a rootkit, a PAM backdoor, credential harvesting, and more, revealing how this malware enables stealthy access, persistence, and potential supply-chain attacks.</description>
      <link>https://www.trendmicro.com/en_us/research/26/e/quasar-linux-qlnx-a-silent-foothold-in-the-software-supply-chain.html</link>
      <pubDate>Mon, 4 May 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Aliakbar Zahravi</name>
          <title>Staff Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Ahmed Mohamed Ibrahim </name>
          <title>Malware Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Aliakbar Zahravi</dc:creator>
      <dc:creator>Ahmed Mohamed Ibrahim </dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Data center</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/quasar-linux–a-silent-foothold-in-the-supply-chain:Large?qlt=80"/>
    </item>
    <item>
      <title>Inside Shadow-Earth-053: A China-Aligned Cyberespionage Campaign Against Government and Defense Sectors in Asia</title>
      <description>A China-aligned threat group is exploiting unpatched Microsoft Exchange vulnerabilities to conduct cyberespionage against government and critical infrastructure targets across Asia and beyond.</description>
      <link>https://www.trendmicro.com/en_us/research/26/d/inside-shadow-earth-053.html</link>
      <pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Daniel Lunghi</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Lucas Silva</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Daniel Lunghi</dc:creator>
      <dc:creator>Lucas Silva</dc:creator>
      <trendmicro:primaryTag>APT &amp; Targeted Attacks</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/shadow-earth_976:Large?qlt=80"/>
    </item>
    <item>
      <title>Kuse Web App Abused to Host Phishing Document</title>
      <description>Bad actors took advantage of the legitimate name and services of Kuse, a popular AI-based app designed for workplaces. The attackers exploited the users’ trust in Kuse to carry out a phishing attack.</description>
      <link>https://www.trendmicro.com/en_us/research/26/d/kuse-web-app-abused-to-host-phishing-document.html</link>
      <pubDate>Wed, 29 Apr 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jed Valderama</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Kenneth Polagñe</name>
          <title>Security Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jed Valderama</dc:creator>
      <dc:creator>Kenneth Polagñe</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Web</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/kuse-web-app-abused-to-host-phishing-document:Large?qlt=80"/>
    </item>
    <item>
      <title>Void Dokkaebi Uses Fake Job Interview Lure to Spread Malware via Code Repositories</title>
      <description>Our research on Void Dokkaebi’s operations uncovered a campaign that turns infected developer repositories into malware delivery channels. By spreading through trusted workflows, organizational codebases, and open-source projects, the threat can scale from a single compromise to a broader supply chain risk.</description>
      <link>https://www.trendmicro.com/en_us/research/26/d/void-dokkaebi-uses-fake-job-interview-lure-to-spread-malware-via-code-repositories.html</link>
      <pubDate>Tue, 21 Apr 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Lucas Silva</name>
          <title>Incident Response Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Lucas Silva</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/void-dokkaebi-weaponizes-developer-ecosystem:Large?qlt=80"/>
    </item>
    <item>
      <title>The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables</title>
      <description>An OAuth supply chain compromise at Vercel exposed how trusted third party apps and platform environment variables can bypass traditional defenses and amplify blast radius. This article examines the attack chain, underlying design tradeoffs, and what it reveals about modern PaaS and software supply chain risk.</description>
      <link>https://www.trendmicro.com/en_us/research/26/d/vercel-breach-oauth-supply-chain.html</link>
      <pubDate>Mon, 20 Apr 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Peter Girnus</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Peter Girnus</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/vercel-breach:Large?qlt=80"/>
    </item>
    <item>
      <title>Identity Protection in the AI Era</title>
      <description>Enterprises aiming to predict and mitigate human, machine, and AI‑agent risks at scale demand AI‑powered identity‑first security without compromise.</description>
      <link>https://www.trendmicro.com/en_us/research/26/d/ai-era-identity-production.html</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Sara Atie</name>
          <title>Senior Product Marketing Manager</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Sophie Chiang</name>
          <title>Senior Product Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Sara Atie</dc:creator>
      <dc:creator>Sophie Chiang</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Web</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Network</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/identity-protection-in-the-ai-era-blog-img:Large?qlt=80"/>
    </item>
    <item>
      <title>U.S. Public Sector Under Siege: Threat Intelligence for Q1 2026</title>
      <description>The first quarter of 2026 has reinforced a hard truth: U.S. government agencies and educational institutions are operating in the most hostile cyber threat environment ever recorded.</description>
      <link>https://www.trendmicro.com/en_us/research/26/d/us-public-sector-under-siege.html</link>
      <pubDate>Thu, 9 Apr 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jon Clay</name>
          <title>VP, Threat Intelligence</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jon Clay</dc:creator>
      <trendmicro:primaryTag>APT &amp; Targeted Attacks</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Network</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/us-public-sector-under-siege:Large?qlt=80"/>
    </item>
    <item>
      <title>Claude Code Packaging Error Remains a Lure in an Active Campaign: What Defenders Should Do </title>
      <description>Threat actors leveraged Anthropic’s Claude Code npm release packaging error to distribute Vidar, GhostSocks, and PureLog Stealer. This blog details immediate steps organizations can take and best practices to prevent further risk.</description>
      <link>https://www.trendmicro.com/en_us/research/26/d/claude-code-remains-a-lure-what-defenders-should-do.html</link>
      <pubDate>Tue, 7 Apr 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jacob Santos</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Sophia Nilette Robles</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jacob Santos</dc:creator>
      <dc:creator>Sophia Nilette Robles</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/claude-code-still-a-lure-fig1-hero:Large?qlt=80"/>
    </item>
    <item>
      <title>Weaponizing Trust Signals: Claude Code Lures and GitHub Release Payloads</title>
      <description>A packaging error in Anthropic’s Claude Code npm release briefly exposed internal source code. This entry examines how threat actors rapidly weaponized the resulting attention, pivoting an existing AI-themed campaign to spread Vidar and GhostSocks.</description>
      <link>https://www.trendmicro.com/en_us/research/26/d/weaponizing-trust-claude-code-lures-and-github-release-payloads.html</link>
      <pubDate>Fri, 3 Apr 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jacob Santos</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Sophia Nilette Robles</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jeffrey Francis Bonaobra</name>
          <title>Senior Threat Response Engineer</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jacob Santos</dc:creator>
      <dc:creator>Sophia Nilette Robles</dc:creator>
      <dc:creator>Jeffrey Francis Bonaobra</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/claudecodetomalware-976:Large?qlt=80"/>
    </item>
    <item>
      <title>TrendAI Insight: New U.S. National Cyber Strategy</title>
      <description>TrendAI reviews the White House National Cyber Strategy, outlining six pillars to strengthen U.S. cybersecurity—from deterrence and regulation to federal modernization, critical infrastructure protection, AI leadership, and workforce development.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/trendai-insight-new-us-national-cyber-strategy.html</link>
      <pubDate>Wed, 1 Apr 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jon Clay</name>
          <title>VP, Threat Intelligence</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jon Clay</dc:creator>
      <trendmicro:primaryTag>Privacy &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Network</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/trendai-insight-new-us-national-cyber-strategy-tn:Large?qlt=80"/>
    </item>
    <item>
      <title>The Real Risk of Vibecoding</title>
      <description>This blog looks at how AI‑driven vibecoding speeds up software development while increasing security risk by outpacing traditional review and ownership. It explains why security needs to move earlier and be built into modern development workflows.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/the-real-risk-of-vibecoding.html</link>
      <pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Bestin Koruthu</name>
          <title>Senior Product Management Cloud Security</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Nicolas Boutmy</name>
          <title>Senior Product Management Cloud Security</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Bestin Koruthu</dc:creator>
      <dc:creator>Nicolas Boutmy</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Data center</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/the-real-risk-of-vibecoding:Large?qlt=80"/>
    </item>
    <item>
      <title>Axios NPM Package Compromised: Supply Chain Attack Hits JavaScript HTTP Client with 100M+ Weekly Downloads</title>
      <description>A supply chain attack hit Axios when attackers used stolen npm credentials to publish malicious versions containing a phantom dependency. This triggered a cross-platform RAT during installation and replaced its files with clean decoys, making detection challenging.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/axios-npm-package-compromised.html</link>
      <pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Peter Girnus</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jacob Santos</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Peter Girnus</dc:creator>
      <dc:creator>Jacob Santos</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/axios-supply-chain-attack-thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>TrendAI™ Research at RSAC 2026: Advancing Defense Across AI‑Driven and Cyber‑Physical Threats</title>
      <description>TrendAI™ Research explored agentic AI cybercrime and EV infrastructure security through two research sessions at RSAC 2026.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/trendai-research-at-rsac-2026.html</link>
      <pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>TrendAI™ Research</name>
          <title>TrendAI™</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>TrendAI™ Research</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/RSAC1_for_thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>TeamPCP’s Telnyx Attack Marks a Shift in Tactics Beyond LiteLLM</title>
      <description>Moving beyond their LiteLLM campaign, TeamPCP weaponizes the Telnyx Python SDK with stealthy WAV‑based payloads to steal credentials across Linux, macOS, and Windows.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/teampcp-telnyx-attack-marks-a-shift-in-tactics.html</link>
      <pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>John Rainier Navato</name>
          <title>Senior Threat Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>John Rainier Navato</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/Telnyx-976:Large?qlt=80"/>
    </item>
    <item>
      <title>Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise </title>
      <description>TeamPCP orchestrated one of the most sophisticated multi-ecosystem supply chain campaigns publicly documented to date. It cascaded through developer tooling and compromised LiteLLM and exposed how AI proxy services that concentrate API keys and cloud credentials become high-value collateral when supply chain attacks compromise upstream dependencies. </description>
      <link>https://www.trendmicro.com/en_us/research/26/c/inside-litellm-supply-chain-compromise.html</link>
      <pubDate>Thu, 26 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Peter Girnus</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Fernando Tucci</name>
          <title>Senior Product Manager</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Deep Patel</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Simon Dulude</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Ashish Verma</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>John Rainier Navato</name>
          <title>Senior Threat Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Peter Girnus</dc:creator>
      <dc:creator>Fernando Tucci</dc:creator>
      <dc:creator>Deep Patel</dc:creator>
      <dc:creator>Simon Dulude</dc:creator>
      <dc:creator>Ashish Verma</dc:creator>
      <dc:creator>John Rainier Navato</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Threats</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/litellm-compromise-thumb:Large?qlt=80"/>
    </item>
    <item>
      <title>Pawn Storm Campaign Deploys PRISMEX, Targets Government and Critical Infrastructure Entities </title>
      <description>This blog discusses the steganography, cloud abuse, and email-based backdoors used against the Ukrainian defense supply chain in the latest Pawn Storm campaign that TrendAI™ Research observed and analyzed. </description>
      <link>https://www.trendmicro.com/en_us/research/26/c/pawn-storm-targets-govt-infra.html</link>
      <pubDate>Thu, 26 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Feike Hacquebord</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Hiroyuki Kakara</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Feike Hacquebord</dc:creator>
      <dc:creator>Hiroyuki Kakara</dc:creator>
      <trendmicro:primaryTag>APT &amp; Targeted Attacks</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/pawn-storm-malware:Large?qlt=80"/>
    </item>
    <item>
      <title>Your AI Stack Just Handed Over Your Root Keys: Inside the litellm PyPI Breach</title>
      <description>Litellm PyPI breach explained: malicious versions steal cloud credentials, SSH keys, and Kubernetes secrets. Learn impact and urgent mitigation steps.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/your-ai-stack-just-handed-over-your-root-keys-inside-the-litellm-pypi-breach.html</link>
      <pubDate>Wed, 25 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Fernando Tucci</name>
          <title>Senior Product Manager, AI Security</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Fernando Tucci</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <category>Trend Micro Research : Data center</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/pypi-breach-blog:Large?qlt=80"/>
    </item>
    <item>
      <title>Copyright Lures Mask a Multi‑Stage PureLog Stealer Attack on Key Industries</title>
      <description>We look into a stealthy multi‑stage attack campaign that delivers PureLog Stealer entirely in memory using encrypted, fileless techniques.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/copyright-lures-mask-a-multistage-purelog-stealer-attack.html</link>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Mohamed Fahmy</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Allixon Kristoffer Francisco</name>
          <title>Threat Intel Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jonna Santos</name>
          <title>Sr. Security Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Mohamed Fahmy</dc:creator>
      <dc:creator>Allixon Kristoffer Francisco</dc:creator>
      <dc:creator>Jonna Santos</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Investigations</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/purelog976:Large?qlt=80"/>
    </item>
    <item>
      <title>Why East-West Visibility Matters for Grid Security</title>
      <description>Learn how east-west traffic visibility helps detect and stop lateral movement attacks inside electric grid infrastructure and critical OT networks.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/why-east-west-visibility-matters-for-grid-security.html</link>
      <pubDate>Wed, 18 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Vitaliy Shtym</name>
          <title>VP, Business Strategy and Client Success</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Vitaliy Shtym</dc:creator>
      <trendmicro:primaryTag>Compliance &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Consumer Focus</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Privacy &amp; Risks</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : ICS OT</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : IoT</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Network</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/why-east-west-visibility-matters-for-grid-security-tn:Large?qlt=80"/>
    </item>
    <item>
      <title>From Misconfigured Spring Boot Actuator to SharePoint Exfiltration: How Stolen Credentials Bypass MFA</title>
      <description>Not every cloud breach starts with malware or a zero-day. In this incident, attackers discovered an exposed Spring Boot Actuator endpoint, harvested credentials from leaked configuration data, then used the OAuth2 Resource Owner Password Credentials (ROPC) flow to authenticate without MFA.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/from-misconfigured-spring-boot-actuator-to-sharepoint-exfiltrati.html</link>
      <pubDate>Wed, 18 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Ryan Soliven</name>
          <title>Sr. Incident Response Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jovit Samaniego</name>
          <title>Incident Response Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Reine Roque</name>
          <title>Sr. Security Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Ryan Soliven</dc:creator>
      <dc:creator>Jovit Samaniego</dc:creator>
      <dc:creator>Reine Roque</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Investigations</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/sharepoint-976:Large?qlt=80"/>
    </item>
    <item>
      <title>TrendAI™ Supports Global Law Enforcement Efforts</title>
      <description>Learn how TrendAI™  and our researchers contributed threat intelligence and analysis to support INTERPOL against cybercrime.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/trendai-supports-global-law-enforcement-efforts.html</link>
      <pubDate>Mon, 16 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>TrendAI™ Research</name>
          <title>TrendAI™</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>TrendAI™ Research</dc:creator>
      <trendmicro:primaryTag>Cyber Crime</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/lea-operation-img:Large?qlt=80"/>
    </item>
    <item>
      <title>Web Shells, Tunnels, and Ransomware: Dissecting a Warlock Attack</title>
      <description>Warlock continues to enhance its attack chain with new tactics to improve persistence, lateral movement, and defense evasion using an expanded toolset: TightVNC Yuze, and a persistent BYOVD technique leveraging the NSec driver.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/dissecting-a-warlock-attack.html</link>
      <pubDate>Mon, 16 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Maristel Policarpio</name>
          <title>Threat Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Junestherry Dela Cruz</name>
          <title>Senior Adversary Hunter</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Sarah Pearl Camiling</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jacob Santos</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Don Ovid Ladores</name>
          <title>Senior Engineer, Threat IR and Forensic</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Maristel Policarpio</dc:creator>
      <dc:creator>Junestherry Dela Cruz</dc:creator>
      <dc:creator>Sarah Pearl Camiling</dc:creator>
      <dc:creator>Jacob Santos</dc:creator>
      <dc:creator>Don Ovid Ladores</dc:creator>
      <trendmicro:primaryTag>Ransomware</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/dissecting-hero:Large?qlt=80"/>
    </item>
    <item>
      <title>Securing Autonomous AI Agents with TrendAI &amp; NVIDIA OpenShell</title>
      <description>Learn how TrendAI and NVIDIA OpenShell help secure autonomous AI agents and build trusted enterprise AI systems with stronger visibility and control.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/securing-autonomous-ai-agents-with-trendai-and-nvidia-openshell.html</link>
      <pubDate>Mon, 16 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Fernando Cardoso</name>
          <title>VP Product Management</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>King Cao</name>
          <title>Director, Product Management</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Truman Coburn</name>
          <title>Sr. Product Marketing</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Bestin Koruthu</name>
          <title>Sr. Product Marketing</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Fernando Cardoso</dc:creator>
      <dc:creator>King Cao</dc:creator>
      <dc:creator>Truman Coburn</dc:creator>
      <dc:creator>Bestin Koruthu</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/securing-autonomous-ai-agents-with-trendai-and-nvidia-openshell:Large?qlt=80"/>
    </item>
    <item>
      <title>Through the Lens of MDR: Analysis of KongTuke’s ClickFix Abuse of Compromised WordPress Sites</title>
      <description>Our analysis of an active KongTuke campaign deploying modeloRAT — malware capable of reconnaissance, command execution, and persistent access — through compromised WordPress sites and fake CAPTCHA lures shows that the group still operates this delivery chain in parallel with the newer CrashFix technique.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/kongtuke-clickfix-abuse-of-compromised-wordpress-sites.html</link>
      <pubDate>Tue, 10 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Aira Marcelo</name>
          <title>Incident Response Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jovit Samaniego</name>
          <title>Incident Response Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Ryan Maglaque</name>
          <title>Incident Response Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Fe Cureg</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Lisa Wu</name>
          <title>Senior Security Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Aira Marcelo</dc:creator>
      <dc:creator>Jovit Samaniego</dc:creator>
      <dc:creator>Ryan Maglaque</dc:creator>
      <dc:creator>Fe Cureg</dc:creator>
      <dc:creator>Lisa Wu</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/clickfix-976:Large?qlt=80"/>
    </item>
    <item>
      <title>CISOs in a Pinch: A Security Analysis of OpenClaw</title>
      <description>Learn about OpenClaw (a sovereign agent) and how this can be viable for enterprises.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/cisos-in-a-pinch-a-security-analysis-openclaw.html</link>
      <pubDate>Tue, 10 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Fernando Tucci</name>
          <title>Senior Product Manager, AI Security</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Fernando Tucci</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/security-analysis-of-openclaw-img:Large?qlt=80"/>
    </item>
    <item>
      <title>TrendAI™ at [un]prompted 2026: From KYC Exploits to Agentic Defense</title>
      <description>At [un]prompted 2026, TrendAI™ demonstrated how documents can be used to exploit AI-driven KYC pipelines and introduced FENRIR, an automated system for discovering AI vulnerabilities at scale.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/trendai-at-unprompted-2026.html</link>
      <pubDate>Mon, 9 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>TrendAI™ Research</name>
          <title>TrendAI™</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>TrendAI™ Research</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/unprompted-976-2:Large?qlt=80"/>
    </item>
    <item>
      <title>New BoryptGrab Stealer Targets Windows Users via Deceptive GitHub Pages</title>
      <description>The BoryptGrab campaign uses fake SEO‑optimized GitHub repositories and deceptive download pages to distribute a data‑stealing malware family that delivers multiple payloads, including a reverse SSH backdoor, to Windows users.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/boryptgrab-stealer-targets-users-via-deceptive-github-pages.html</link>
      <pubDate>Thu, 5 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Mingyue Shirley Yang</name>
          <title>Malware Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Mingyue Shirley Yang</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/AsyncRAT-cover:Large?qlt=80"/>
    </item>
    <item>
      <title> Europol, Microsoft, TrendAI™ and Collaborators Halt Tycoon 2FA Operations</title>
      <description>Tycoon 2FA was dismantled this week by law enforcement and industry partners including TrendAI™. The phishing-as-a-service platform offered MFA bypass services using adversary-in-the-middle (AitM) proxying.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/tycoon2fa-takedown.html</link>
      <pubDate>Wed, 4 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Christopher Boyton</name>
          <title>Adversary Hunter</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Mayra Rosario Fuentes</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Stephen Hilt</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Christopher Boyton</dc:creator>
      <dc:creator>Mayra Rosario Fuentes</dc:creator>
      <dc:creator>Stephen Hilt</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/phaas-takedown-thumb:Large?qlt=80"/>
    </item>
    <item>
      <title>Claude Code Security set the Cybersecurity Stocks on Fire - Here's the Signal in the Smoke</title>
      <description>Learn how Claude Code Security set Cybersecurity stocks on fire.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/claude-code-security-set-the-cybersecurity-stocks-on-fire.html</link>
      <pubDate>Tue, 3 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Fernando Tucci</name>
          <title>Senior Product Manager, AI Security</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Fernando Tucci</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/claude-code-security-img:Large?qlt=80"/>
    </item>
    <item>
      <title>Malicious OpenClaw Skills Used to Distribute Atomic macOS Stealer</title>
      <description>Malicious OpenClaw skills trick AI agents and users into installing a new AMOS variant that steals extensive data at scale.</description>
      <link>https://www.trendmicro.com/en_us/research/26/b/openclaw-skills-used-to-distribute-atomic-macos-stealer.html</link>
      <pubDate>Mon, 23 Feb 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Alfredo Oliveira</name>
          <title>Sr. Security Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Buddy Tancio</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>David Fiser</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Philippe Lin</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Roel Reyes</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Alfredo Oliveira</dc:creator>
      <dc:creator>Buddy Tancio</dc:creator>
      <dc:creator>David Fiser</dc:creator>
      <dc:creator>Philippe Lin</dc:creator>
      <dc:creator>Roel Reyes</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/amos-976:Large?qlt=80"/>
    </item>
    <item>
      <title>Spam Campaign Abuses Atlassian Jira, Targets Government and Corporate Entities</title>
      <description>We uncover how a campaign used Atlassian Jira Cloud to launch automated and targeted spam campaigns, exploiting trusted SaaS workflows to bypass security controls.</description>
      <link>https://www.trendmicro.com/en_us/research/26/b/spam-campaign-abuses-atlassian-jira.html</link>
      <pubDate>Tue, 17 Feb 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>TrendAI™ Research</name>
          <title>TrendAI™</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>TrendAI™ Research</dc:creator>
      <trendmicro:primaryTag>Spam</trendmicro:primaryTag>
      <category>Trend Micro Research : Spam</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/atlassian_spam_campaign:Large?qlt=80"/>
    </item>
    <item>
      <title>U.S. Public Sector Under Siege</title>
      <description>Discover why Government and Education must prioritize Cyber Risk Management.</description>
      <link>https://www.trendmicro.com/en_us/research/26/b/us-public-sector-under-siege.html</link>
      <pubDate>Fri, 6 Feb 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jon Clay</name>
          <title>VP, Threat Intelligence</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jon Clay</dc:creator>
      <trendmicro:primaryTag>Compliance &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/thmb-us-public-sector-under-siege-blog-img:Large?qlt=80"/>
    </item>
    <item>
      <title>Viral AI, Invisible Risks:  What OpenClaw Reveals About Agentic Assistants</title>
      <description>OpenClaw (aka Clawdbot or Moltbot) represents a new frontier in agentic AI: powerful, highly autonomous, and surprisingly easy to use. In this research, we examine how its capabilities compare to its predecessors’ and highlight the security risks inherent to the agentic AI paradigm.</description>
      <link>https://www.trendmicro.com/en_us/research/26/b/what-openclaw-reveals-about-agentic-assistants.html</link>
      <pubDate>Fri, 6 Feb 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Salvatore Gariuolo</name>
          <title>Senior Threat Researcher, Forward-Looking Threat Research Team</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Vincenzo Ciancaglini</name>
          <title>Senior Threat Researcher, Forward-Looking Threat Research Team</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Fernando Tucci</name>
          <title>Senior Project Manager, AI Security</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Salvatore Gariuolo</dc:creator>
      <dc:creator>Vincenzo Ciancaglini</dc:creator>
      <dc:creator>Fernando Tucci</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/OpenClaw-976:Large?qlt=80"/>
    </item>
    <item>
      <title>Embracing Choice in Cybersecurity: TrendAI Vision One™ and SentinelOne Integration</title>
      <description>Discover how the TrendAI Vision One and SentinelOne integration exemplifies our commitment to endpoint flexibility.</description>
      <link>https://www.trendmicro.com/en_us/research/26/a/embracing-choice-in-cybersecurity.html</link>
      <pubDate>Mon, 26 Jan 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jenny Hua</name>
          <title>Product Marketing Manager, Ecosystem</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jenny Hua</dc:creator>
      <trendmicro:primaryTag>Endpoints</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Network</category>
      <category>Trend Micro Research : Security Strategies</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/vision-one-sentinel-one-integration-blog:Large?qlt=80"/>
    </item>
    <item>
      <title>Pwn2Own: Researchers Earn $1 Million for 76 Zero-Days</title>
      <description>Discover how TrendAI Zero Day Initiative (ZDI) identified critical vulnerabilities across connected vehicles, EV chargers, and automotive systems.</description>
      <link>https://www.trendmicro.com/en_us/research/26/a/pwn2own-researchers-earn-1-million-for-76-zero-days.html</link>
      <pubDate>Mon, 26 Jan 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Trend Micro Research</name>
          <title>Trend Micro</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Trend Micro Research</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Connected Car</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/thmb-pwn2own-researchers-earn-1-million-for-76-zero-days:Large?qlt=80"/>
    </item>
    <item>
      <title>PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups</title>
      <description>PeckBirdy is a sophisticated JScript-based C&amp;C framework used by China-aligned APT groups to exploit LOLBins across multiple environments, delivering advanced backdoors to target gambling industries and Asian government entities.</description>
      <link>https://www.trendmicro.com/en_us/research/26/a/peckbirdy-script-framework.html</link>
      <pubDate>Mon, 26 Jan 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Ted Lee</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Joseph C Chen</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Ted Lee</dc:creator>
      <dc:creator>Joseph C Chen</dc:creator>
      <trendmicro:primaryTag>APT &amp; Targeted Attacks</trendmicro:primaryTag>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/peckbirdy-976:Large?qlt=80"/>
    </item>
    <item>
      <title>Watering Hole Attack Targets EmEditor Users with Information-Stealing Malware</title>
      <description>TrendAI™ Research provides a technical analysis of a compromised EmEditor installer used to deliver multistage malware that performs a range of malicious actions. </description>
      <link>https://www.trendmicro.com/en_us/research/26/a/watering-hole-attack-targets-emeditor-users.html</link>
      <pubDate>Thu, 22 Jan 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Don Ovid Ladores</name>
          <title>Senior Engineer, Threat IR and Forensic</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Yuya Sato</name>
          <title>Senior Engineer, Threat IR and Forensic</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Yosuke Akiho</name>
          <title>Senior Engineer, Threat IR and Forensic</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Don Ovid Ladores</dc:creator>
      <dc:creator>Yuya Sato</dc:creator>
      <dc:creator>Yosuke Akiho</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Cyber Risk</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/emeditor-976:Large?qlt=80"/>
    </item>
    <item>
      <title>From Extension to Infection: An In-Depth Analysis of the Evelyn Stealer Campaign Targeting Software Developers</title>
      <description>This blog entry provides an in-depth analysis of the multistage delivery of the Evelyn information stealer, which was used in a campaign targeting software developers.</description>
      <link>https://www.trendmicro.com/en_us/research/26/a/analysis-of-the-evelyn-stealer-campaign.html</link>
      <pubDate>Mon, 19 Jan 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Ahmed Mohamed Ibrahim </name>
          <title>Malware Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Ahmed Mohamed Ibrahim </dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/Evelyn-cover:Large?qlt=80"/>
    </item>
    <item>
      <title>Your 100 Billion Parameter Behemoth is a Liability</title>
      <description>The "bigger is better" era of AI is hitting a wall. We are in an LLM bubble, characterized by ruinous inference costs and diminishing returns. The future belongs to Agentic AI powered by specialized Small Language Models (SLMs). Think of it as a shift from hiring a single expensive genius to running a highly efficient digital factory. It’s cheaper, faster, and frankly, the only way to make agents work at scale.</description>
      <link>https://www.trendmicro.com/en_us/research/26/a/your-100-billion-parameter-behemoth-is-a-liability.html</link>
      <pubDate>Fri, 16 Jan 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Fernando Tucci</name>
          <title>Senior Product Manager, AI Security</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Fernando Tucci</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Data center</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/your-100-billion-parameter-behemoth-is-a-liability:Large?qlt=80"/>
    </item>
    <item>
      <title>Introducing ÆSIR: Finding Zero-Day Vulnerabilities at the Speed of AI</title>
      <description>TrendAI™’s ÆSIR platform combines AI automation with expert oversight to discover zero-day vulnerabilities in AI infrastructure – 21 CVEs across NVIDIA, Tencent, and MLflow since mid-2025.</description>
      <link>https://www.trendmicro.com/en_us/research/26/a/aesir.html</link>
      <pubDate>Thu, 15 Jan 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Peter Girnus</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Peter Girnus</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/AESIR_thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>Key Insights on SHADOW-AETHER-015 and Earth Preta from the 2025 MITRE ATT&amp;CK Evaluation with TrendAI Vision One™ </title>
      <description>This blog discusses notable modern TTPs observed from SHADOW-AETHER-015 and Earth Preta, from TrendAI™ Research monitoring and TrendAI Vision One™ intelligence. These findings support the performance of TrendAI™ in the 2025 MITRE ATT&amp;CK Evaluations.  </description>
      <link>https://www.trendmicro.com/en_us/research/26/a/shadow-aether-015-earth-preta-mitre.html</link>
      <pubDate>Tue, 13 Jan 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/shadow-aether-earth-preta_thumb:Large?qlt=80"/>
    </item>
    <item>
      <title>Analyzing a Multi-Stage AsyncRAT Campaign via Managed Detection and Response</title>
      <description>Threat actors exploited Cloudflare's free-tier infrastructure and legitimate Python environments to deploy the AsyncRAT remote access trojan, demonstrating advanced evasion techniques that abuse trusted cloud services for malicious operations.</description>
      <link>https://www.trendmicro.com/en_us/research/26/a/analyzing-a-a-multi-stage-asyncrat-campaign-via-mdr.html</link>
      <pubDate>Mon, 12 Jan 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Buddy Tancio</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jed Valderama</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Khristoffer Jocson</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Franklynn Uy</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Buddy Tancio</dc:creator>
      <dc:creator>Jed Valderama</dc:creator>
      <dc:creator>Khristoffer Jocson</dc:creator>
      <dc:creator>Franklynn Uy</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/asyncrat-cover:Large?qlt=80"/>
    </item>
    <item>
      <title>Get Executives on board with managing Cyber Risk</title>
      <description>Learn how the 2025 Trend Micro Defenders Survey Report helps paint a clear picture of how security teams are looking to work with executive leaders to manage cyber risk.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/managing-cyber-risk-with-executives.html</link>
      <pubDate>Mon, 29 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Compliance &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Annual Predictions</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/executives-managing-cyber-risk-blog-img:Large?qlt=80"/>
    </item>
    <item>
      <title>Trend Micro's Pivotal Role in INTERPOL's Operation Sentinel: Dismantling Digital Extortion Networks Across Africa</title>
      <description>Continuing a Legacy of Successful Collaboration</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/operation-sentinel-digital-extortion-campaigns-identified.html</link>
      <pubDate>Mon, 29 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Cyber Crime</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/operation-sentinel:Large?qlt=80"/>
    </item>
    <item>
      <title>What Does it Take to Manage Cloud Risk?</title>
      <description>Learn why hybrid and multi-cloud environments are vital for IT and business success from our 2025 Trend Micro Defenders Survey.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/managing-cloud-risk.html</link>
      <pubDate>Mon, 22 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Compliance &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Annual Predictions</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/what-it-takes-to-manage-cloud-risk-blog-thmb:Large?qlt=80"/>
    </item>
    <item>
      <title>What Cyber Defenders Really Think About AI Risk</title>
      <description>Learn how Trend Micro's 2025 Trend Micro Defenders Survey Report highlights current AI-related cybersecurity priorities and where security professionals use AI to their advantage.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/cyber-defenders-and-ai-risks.html</link>
      <pubDate>Thu, 18 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Annual Predictions</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/cyber-defenders-and-ai-risks-blog-thmb:Large?qlt=80"/>
    </item>
    <item>
      <title>Enhancing Security Awareness with Cyber Risk Exposure Management</title>
      <description>Learn how to strategically tackle human risk for smarter prioritization and lasting behavioral change.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/optimize-security-management-in-cyber-risk-exposure-management.html</link>
      <pubDate>Mon, 15 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Sanjana Sadh</name>
          <title>Trend Micro</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Sanjana Sadh</dc:creator>
      <trendmicro:primaryTag>Phishing</trendmicro:primaryTag>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Security Strategies</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/how-to-make-people-part-of-your-security-strategy-blog-img:Large?qlt=80"/>
    </item>
    <item>
      <title>Cyber Risk Management: Defenders Tell It Like It Is</title>
      <description>Based on more than 3,000 responses from cybersecurity professionals in nearly 90 countries, our Trend Micro Defenders Survey Report 2025 shines a bright light on the current state of cyber risk management. From the impact of cloud and AI on IT environments to top technical and human challenges, this year’s findings have a lot to say about the pressures security teams are under and what organizations are doing to tighten their grip on cyber risk.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/trend-micros-2025-defenders-survey-report.html</link>
      <pubDate>Mon, 15 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Compliance &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Report</category>
      <category>Trend Micro Research : Annual Predictions</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/trend-micros-2025-defenders-survey-report:Large?qlt=80"/>
    </item>
    <item>
      <title>SHADOW-VOID-042 Targets Multiple Industries with Void Rabisu-like Tactics</title>
      <description>In November, a targeted spear-phishing campaign was observed using Trend Micro-themed lures against various industries, but this was quickly detected and thwarted by the Trend Vision One™ platform.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/SHADOW-VOID-042.html</link>
      <pubDate>Thu, 11 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Daniel Lunghi</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Ian Kenefick</name>
          <title>Senior Adversary Hunter</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Feike Hacquebord</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Daniel Lunghi</dc:creator>
      <dc:creator>Ian Kenefick</dc:creator>
      <dc:creator>Feike Hacquebord</dc:creator>
      <trendmicro:primaryTag>Phishing</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/SHADOW-VOID-042_thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>Trend Vision One™ Integration with AWS Security Hub CSPM: Unifying Cloud Security</title>
      <description>The integration between Trend Vision One and Security Hub CSPM is exactly that, two powerful platforms enhancing each other to keep your AWS infrastructure protected.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/aws-security-hub-integration.html</link>
      <pubDate>Wed, 10 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Eduardo Castro</name>
          <title>Product Management</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Yessenia Becerra</name>
          <title>Technical Leader</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Dave McDuff</name>
          <title>Senior Product Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Eduardo Castro</dc:creator>
      <dc:creator>Yessenia Becerra</dc:creator>
      <dc:creator>Dave McDuff</dc:creator>
      <trendmicro:primaryTag>Compliance &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : How To</category>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Deep Web</category>
      <category>Trend Micro Research : Privacy &amp; Risks</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Spam</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/aws-security-hub-integration:Large?qlt=80"/>
    </item>
    <item>
      <title>Trend Vision One™ Stacks Up Against Scattered Spider and Mustang Panda in 2025 MITRE ATT&amp;CK® Evaluations</title>
      <description>Enterprise 2025 introduces the first full cloud adversary emulation and expanded multi-platform testing, focusing on two advanced threat areas: Scattered Spider’s cloud-centric attacks and Mustang Panda’s long-term espionage operations.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/cloud-automation-2025-mitre-attack-round-7.html</link>
      <pubDate>Wed, 10 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Cloud</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Privacy &amp; Risks</category>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : IoT</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/cloud-automation-2025-mitre-attack-round-7:Large?qlt=80"/>
    </item>
    <item>
      <title>CVE-2025-55182: React2Shell Analysis, Proof-of-Concept Chaos, and In-the-Wild Exploitation </title>
      <description>CVE-2025-55182 is a CVSS 10.0 pre-authentication RCE affecting React Server Components. Amid the flood of fake proof-of-concept exploits, scanners, exploits, and widespread misconceptions, this technical analysis intends to cut through the noise.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/CVE-2025-55182-analysis-poc-itw.html</link>
      <pubDate>Wed, 10 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Peter Girnus</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Deep Patel</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jack Walsh</name>
          <title>Adversary Hunter</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Lucas Silva</name>
          <title>Incident Response Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Ashish Verma</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Peter Girnus</dc:creator>
      <dc:creator>Deep Patel</dc:creator>
      <dc:creator>Jack Walsh</dc:creator>
      <dc:creator>Lucas Silva</dc:creator>
      <dc:creator>Ashish Verma</dc:creator>
      <trendmicro:primaryTag>Exploits &amp; Vulnerabilities</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/CVE-2025-55182-thumb:Large?qlt=80"/>
    </item>
    <item>
      <title>AI-Automated Threat Hunting Brings GhostPenguin Out of the Shadows</title>
      <description>In this blog entry, Trend™ Research provides a comprehensive breakdown of GhostPenguin, a previously undocumented Linux backdoor with low detection rates that was discovered through AI-powered threat hunting and in-depth malware analysis.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/ghostpenguin.html</link>
      <pubDate>Mon, 8 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Aliakbar Zahravi</name>
          <title>Staff Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Aliakbar Zahravi</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/GhostPenguin_thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>Critical React Server Components Vulnerability CVE-2025-55182: What Security Teams Need to Know</title>
      <description>CVE-2025-55182 is a critical (CVSS 10.0) pre-authentication remote code execution vulnerability affecting React Server Components used in React.js, Next.js, and related frameworks (see the context section for a more exhaustive list of affected frameworks).</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/critical-react-server-components-vulnerability.html</link>
      <pubDate>Fri, 5 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Peter Girnus</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Peter Girnus</dc:creator>
      <trendmicro:primaryTag>Exploits &amp; Vulnerabilities</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/critical-react-server-components-vulnerability-tn:Large?qlt=80"/>
    </item>
    <item>
      <title>Project View: A New Era of Prioritized and Actionable Cloud Security</title>
      <description>In today's cloud-first world, security teams face an overwhelming flood of alerts, fragmented visibility, and reactive workflows. The complexity of modern cloud environments—spanning multi-cloud deployments, ephemeral assets, and decentralized ownership—demands a new approach to risk management.</description>
      <link>https://www.trendmicro.com/en_us/research/25/k/cloud-risk-management.html</link>
      <pubDate>Thu, 4 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Truman Coburn</name>
          <title>Sr. Product Marketing Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Truman Coburn</dc:creator>
      <trendmicro:primaryTag>Compliance &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : How To</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/cloud-risk-management-1:Large?qlt=80"/>
    </item>
    <item>
      <title>PureRAT Campaign Targets Job Seekers, Abuses Foxit PDF Reader for DLL Side-loading</title>
      <description>Job seekers looking out for opportunities might instead find their personal devices compromised, as a PureRAT campaign propagated through email leverages Foxit PDF Reader for concealment and DLL side-loading for initial entry.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/valleyrat-campaign.html</link>
      <pubDate>Wed, 3 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Sarah Pearl Camiling</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Junestherry Dela Cruz</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jacob Santos</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Sophia Nilette Robles</name>
          <title>Threat Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Maristel Policarpio</name>
          <title>Threat Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Raymart Yambot</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Sarah Pearl Camiling</dc:creator>
      <dc:creator>Junestherry Dela Cruz</dc:creator>
      <dc:creator>Jacob Santos</dc:creator>
      <dc:creator>Sophia Nilette Robles</dc:creator>
      <dc:creator>Maristel Policarpio</dc:creator>
      <dc:creator>Raymart Yambot</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/valleyrat_thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>Unraveling Water Saci's New Multi-Format, AI-Enhanced Attacks Propagated via WhatsApp</title>
      <description>Through AI-driven code conversion and a layered infection chain involving different file formats and scripting languages, the threat actors behind Water Saci are quickly upgrading their malware delivery and propagation methods across WhatsApp in Brazil.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/water-saci.html</link>
      <pubDate>Tue, 2 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jeffrey Francis Bonaobra</name>
          <title>Senior Threat Response Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Sarah Pearl Camiling</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Joe Soares</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Byron Gelera</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Ian Kenefick</name>
          <title>Senior Adversary Hunter</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Emmanuel Panopio</name>
          <title>Senior Threat Response Engineer</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jeffrey Francis Bonaobra</dc:creator>
      <dc:creator>Sarah Pearl Camiling</dc:creator>
      <dc:creator>Joe Soares</dc:creator>
      <dc:creator>Byron Gelera</dc:creator>
      <dc:creator>Ian Kenefick</dc:creator>
      <dc:creator>Emmanuel Panopio</dc:creator>
      <trendmicro:primaryTag>Phishing</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/WaterSaci_thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>What’s your CNAPP maturity?</title>
      <description>More and more enterprises are opting for cloud-native application protection platforms (CNAPPs) instead of complex and hard-to-manage cloud security point solutions. Find out where your organization is on its CNAPP maturity journey.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/whats-your-cnapp-maturity.html</link>
      <pubDate>Mon, 1 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Consumer Focus</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Deep Web</category>
      <category>Trend Micro Research : Privacy &amp; Risks</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Spam</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/whats-your-cnapp-maturity:Large?qlt=80"/>
    </item>
    <item>
      <title>Elevate Your Cloud Security Strategy</title>
      <description>Learn to elevate your cloud security strategy &amp; overcome complexity with Vision One™.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/cloud-security-strategy.html</link>
      <pubDate>Mon, 1 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Eduardo Castro</name>
          <title>Product Management</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Truman Coburn</name>
          <title>Sr. Product Marketing Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Eduardo Castro</dc:creator>
      <dc:creator>Truman Coburn</dc:creator>
      <trendmicro:primaryTag>Compliance &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Security Strategies</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Deep Web</category>
      <category>Trend Micro Research : Privacy &amp; Risks</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Spam</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/cloud-security-strategy-2:Large?qlt=80"/>
    </item>
    <item>
      <title>Shai-hulud 2.0 Campaign Targets Cloud and Developer Ecosystems </title>
      <description>Shai-hulud 2.0 campaign features a sophisticated variant capable of stealing credentials and secrets from major cloud platforms and developer services, while automating the backdooring of NPM packages maintained by victims. Its advanced tactics enable rapid, stealthy propagation across the software supply chain, putting countless downstream users at risk.</description>
      <link>https://www.trendmicro.com/en_us/research/25/k/shai-hulud-2-0-targets-cloud-and-developer-systems.html</link>
      <pubDate>Thu, 27 Nov 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jeffrey Francis Bonaobra</name>
          <title>Senior Threat Response Engineer</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jeffrey Francis Bonaobra</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/shaihulud2-thumb:Large?qlt=80"/>
    </item>
    <item>
      <title>Trend &amp; AWS Partner on Cloud IPS: One-Click Protection</title>
      <description>In the race to secure cloud infrastructure, intrusion prevention systems (IPS) remain one of the most critical yet complex at the cloud network layer of defense. For many organizations, deploying IPS in the cloud is a balancing act between agility and control.</description>
      <link>https://www.trendmicro.com/en_us/research/25/k/cloud-ips-one-click-protection.html</link>
      <pubDate>Thu, 20 Nov 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Bestin Koruthu</name>
          <title>Sr. PM Cloud Security</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Bestin Koruthu</dc:creator>
      <trendmicro:primaryTag>Exploits &amp; Vulnerabilities</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Deep Web</category>
      <category>Trend Micro Research : Privacy &amp; Risks</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Spam</category>
      <category>Trend Micro Research : Network</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/cloud-ips-one-click-protection:Large?qlt=80"/>
    </item>
    <item>
      <title>Breaking Down S3 Ransomware: Variants, Attack Paths and Trend Vision One™ Defenses</title>
      <description>In this blog entry, Trend™ Research explores how ransomware actors are shifting their focus to cloud-based assets, including the tactics used to compromise business-critical data in AWS environments.</description>
      <link>https://www.trendmicro.com/en_us/research/25/k/s3-ransomware.html</link>
      <pubDate>Tue, 18 Nov 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Yash Verma</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Yash Verma</dc:creator>
      <trendmicro:primaryTag>Ransomware</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/S3Ransomware_thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>Redefining Enterprise Defense in the Era of AI-Led Cyberattacks </title>
      <description>More cybercriminals are turning to using autonomous AI tools to upgrade their attacks, as exemplified by the recent utilization of Anthropic’s Claude Code, prompting an urgent need for enterprises to adopt agentic AI-driven security platforms and proactive defenses to counter AI-related threats. </description>
      <link>https://www.trendmicro.com/en_us/research/25/k/redefining-defense-in-era-of-ai-led-attacks.html</link>
      <pubDate>Fri, 14 Nov 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Cyber Risk</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/redefining-defense-in-ai-led-cyberattacks-hero:Large?qlt=80"/>
    </item>
    <item>
      <title>Increase in Lumma Stealer Activity Coincides with Use of Adaptive Browser Fingerprinting Tactics</title>
      <description>In this blog entry, Trend™ Research analyses the layered command-and-control approaches that Lumma Stealer uses to maintain its ongoing operations while enhancing collection of victim-environment data. </description>
      <link>https://www.trendmicro.com/en_us/research/25/k/lumma-stealer-browser-fingerprinting.html</link>
      <pubDate>Thu, 13 Nov 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Junestherry Dela Cruz</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Sarah Pearl Camiling</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Junestherry Dela Cruz</dc:creator>
      <dc:creator>Sarah Pearl Camiling</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/Lumma_browser_fingerprinting:Large?qlt=80"/>
    </item>
    <item>
      <title>From Data Loss Prevention (DLP) to Modern Data Security</title>
      <description>It’s time to rethink your approach</description>
      <link>https://www.trendmicro.com/en_us/research/25/k/dlp-to-modern-data-security.html</link>
      <pubDate>Wed, 12 Nov 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Consumer Focus</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Privacy &amp; Risks</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Data center</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/dlp-to-modern-data-security:Large?qlt=80"/>
    </item>
    <item>
      <title>IBM Infrastructure: Continuous Risk &amp; Compliance</title>
      <description>Learn all about AI-powered visibility, telemetry, and proactive security across mainframe, cloud, containers, and enterprise workloads.</description>
      <link>https://www.trendmicro.com/en_us/research/25/k/ibm-infrastructure-continuous-risk-compliance.html</link>
      <pubDate>Wed, 12 Nov 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Cloud</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Data center</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/ibm-infrastructure-continuous-risk-compliance:Large?qlt=80"/>
    </item>
    <item>
      <title>How are you managing cloud risk?</title>
      <description>Learn why managing cloud risk demands unified visibility, continuous risk assessment, and efficient security operations. Discover how a full-featured CNAPP like Trend Vision One™ Cloud Security enables organizations to move from reactive to proactive cloud protection.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/manage-cloud-risk.html</link>
      <pubDate>Fri, 31 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Bestin Koruthu</name>
          <title>Sr. PM Cloud Security</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Truman Coburn</name>
          <title>Sr. Product Marketing Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Bestin Koruthu</dc:creator>
      <dc:creator>Truman Coburn</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Cyber Risk</category>
      <category>Trend Micro Research : Security Strategies</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Deep Web</category>
      <category>Trend Micro Research : Privacy &amp; Risks</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Risk Management</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Spam</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/manage-cloud-risk:Large?qlt=80"/>
    </item>
    <item>
      <title>AI Security: NVIDIA BlueField Now with Vision One™</title>
      <description>Launching at NVIDIA GTC 2025 - Transforming AI Security with Trend Vision One™ on NVIDIA BlueField</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/ai-security-nvidia-bluefield.html</link>
      <pubDate>Tue, 28 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Fernando Cardoso</name>
          <title>VP Product Management</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Eduardo Castro</name>
          <title>Trend Micro</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Nancy Chuang</name>
          <title>Trend Micro</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Fernando Cardoso</dc:creator>
      <dc:creator>Eduardo Castro</dc:creator>
      <dc:creator>Nancy Chuang</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Web</category>
      <category>Trend Micro Research : Connected Car</category>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Social Media</category>
      <category>Trend Micro Research : Smart Home</category>
      <category>Trend Micro Research : Data center</category>
      <category>Trend Micro Research : ICS OT</category>
      <category>Trend Micro Research : IoT</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Mobile</category>
      <category>Trend Micro Research : Network</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/ai-security-nvidia-bluefield:Large?qlt=80"/>
    </item>
    <item>
      <title>Active Water Saci Campaign Spreading Via WhatsApp Features Multi-Vector Persistence and Sophisticated C&amp;C</title>
      <description>Continuous investigation on the Water Saci campaign reveals innovative email-based C&amp;C system, multi-vector persistence, and real-time command capabilities that allow attackers to orchestrate coordinated botnet operations, gather detailed campaign intelligence, and dynamically control malware activity across multiple infected machines.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/active-water-saci-campaign-whatsapp-update.html</link>
      <pubDate>Mon, 27 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jeffrey Francis Bonaobra</name>
          <title>Senior Threat Response Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Joe Soares</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Emmanuel Panopio</name>
          <title>Senior Threat Response Engineer</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jeffrey Francis Bonaobra</dc:creator>
      <dc:creator>Joe Soares</dc:creator>
      <dc:creator>Emmanuel Panopio</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/whatsapp-update-thumb:Large?qlt=80"/>
    </item>
    <item>
      <title>Agenda Ransomware Deploys Linux Variant on Windows Systems Through Remote Management Tools and BYOVD Techniques</title>
      <description>Trend™ Research identified a sophisticated Agenda ransomware attack that deployed a Linux variant on Windows systems. This cross-platform execution can make detection challenging for enterprises.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/agenda-ransomware-deploys-linux-variant-on-windows-systems.html</link>
      <pubDate>Thu, 23 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jacob Santos</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Junestherry Dela Cruz</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Sarah Pearl Camiling</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Sophia Nilette Robles</name>
          <title>Threat Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Maristel Policarpio</name>
          <title>Threat Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Raymart Yambot</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jacob Santos</dc:creator>
      <dc:creator>Junestherry Dela Cruz</dc:creator>
      <dc:creator>Sarah Pearl Camiling</dc:creator>
      <dc:creator>Sophia Nilette Robles</dc:creator>
      <dc:creator>Maristel Policarpio</dc:creator>
      <dc:creator>Raymart Yambot</dc:creator>
      <trendmicro:primaryTag>Ransomware</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/agenda-thumb:Large?qlt=80"/>
    </item>
    <item>
      <title>Trend Micro Recognized as a Leader in The Forrester Wave™ 2025 for NAV</title>
      <description>Unified visibility, proactive intelligence, and proven leadership in network analysis and visibility.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/forrester-wave-nav-2025.html</link>
      <pubDate>Wed, 22 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jamal Bethea</name>
          <title>Product Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jamal Bethea</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Network</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/forrester-wave-nav-2025:Large?qlt=80"/>
    </item>
    <item>
      <title>The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns</title>
      <description>Trend™ Research examines the complex collaborative relationship between China-aligned APT groups via the new “Premier Pass-as-a-Service” model, exemplified by the recent activities of Earth Estries and Earth Naga.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/premier-pass-as-a-service.html</link>
      <pubDate>Wed, 22 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Daniel Lunghi</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Leon M Chang</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Daniel Lunghi</dc:creator>
      <dc:creator>Leon M Chang</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/PremierPass-thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>How Trend Micro Empowers the SOC with Agentic SIEM</title>
      <description>By delivering both XDR leadership and Agentic SIEM innovation under one platform, Trend is redefining what security operations can be.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/soc-agentic-siem.html</link>
      <pubDate>Tue, 21 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Joyce Huang</name>
          <title>Senior Product Marketing Manager</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Stephanie Tang</name>
          <title>Product Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Joyce Huang</dc:creator>
      <dc:creator>Stephanie Tang</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Consumer Focus</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/soc-agentic-siem:Large?qlt=80"/>
    </item>
    <item>
      <title>Fast, Broad, and Elusive: How Vidar Stealer 2.0 Upgrades Infostealer Capabilities</title>
      <description>Trend™ Research examines the latest version of the Vidar stealer, which features a full rewrite in C, a multithreaded architecture, and several enhancements that warrant attention. Its timely evolution suggests that Vidar is positioning itself to occupy the space left after Lumma Stealer’s decline.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/how-vidar-stealer-2-upgrades-infostealer-capabilities.html</link>
      <pubDate>Tue, 21 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Junestherry Dela Cruz</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Junestherry Dela Cruz</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/vidar_stealer_v2:Large?qlt=80"/>
    </item>
    <item>
      <title>Shifts in the Underground: The Impact of Water Kurita’s (Lumma Stealer) Doxxing</title>
      <description>A targeted underground doxxing campaign exposed alleged core members of Lumma Stealer (Water Kurita), resulting in a sharp decline in its activity and a migration of customers to rival infostealer platforms.



</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/the-impact-of-water-kurita-lumma-stealer-doxxing.html</link>
      <pubDate>Thu, 16 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Junestherry Dela Cruz</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Junestherry Dela Cruz</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/lumma_stealer_cover-1:Large?qlt=80"/>
    </item>
    <item>
      <title>Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits </title>
      <description>Trend™ Research has uncovered an attack campaign exploiting the Cisco SNMP vulnerability CVE-2025-20352, allowing remote code execution and rootkit deployment on unprotected devices, with impacts observed on Cisco 9400, 9300, and legacy 3750G series.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/operation-zero-disco-cisco-snmp-vulnerability-exploit.html</link>
      <pubDate>Wed, 15 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Dove Chiu</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Lucien Chuang</name>
          <title>Technical Consultant</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Dove Chiu</dc:creator>
      <dc:creator>Lucien Chuang</dc:creator>
      <trendmicro:primaryTag>Exploits &amp; Vulnerabilities</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/thumb-disco:Large?qlt=80"/>
    </item>
    <item>
      <title> Trend Micro launches new integration with Zscaler to deliver real-time,  Risk-Based Zero Trust Access</title>
      <description>Discover how Trend Vision One™ integrates with Zscaler to unify detection and access enforcement, accelerate threat containment, reduce dwell time, and deliver seamless Zero Trust protection for modern enterprises.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/real-time-risk-based-zero-trust.html</link>
      <pubDate>Tue, 14 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jenny Hua</name>
          <title>Product Marketing Manager, Ecosystem</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jenny Hua</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Network</category>
      <category>Trend Micro Research : Security Strategies</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/real-time-risk-based-zero-trust:Large?qlt=80"/>
    </item>
    <item>
      <title>RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits</title>
      <description>Trend™ Research and ZDI Threat Hunters have identified a large-scale RondoDox botnet campaign exploiting over 50 vulnerabilities across more than 30 vendors, including flaws first seen in Pwn2Own contests.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/rondodox.html</link>
      <pubDate>Thu, 9 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Deep Patel</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Ashish Verma</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Simon Dulude</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Peter Girnus</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Deep Patel</dc:creator>
      <dc:creator>Ashish Verma</dc:creator>
      <dc:creator>Simon Dulude</dc:creator>
      <dc:creator>Peter Girnus</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/RondoDox-thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>Weaponized AI Assistants &amp; Credential Thieves</title>
      <description>Learn the state of AI and the NPM ecosystem with the recent s1ngularity' weaponized AI for credential theft.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/weaponized-ai-assistants.html</link>
      <pubDate>Thu, 9 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Fernando Tucci</name>
          <title>Senior Product Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Fernando Tucci</dc:creator>
      <trendmicro:primaryTag>APT &amp; Targeted Attacks</trendmicro:primaryTag>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/the-new-face-of-automated-attacks-tb:Large?qlt=80"/>
    </item>
    <item>
      <title>How Your AI Chatbot Can Become a Backdoor</title>
      <description>In this post of THE AI BREACH, learn how your Chatbot can become a backdoor.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/ai-chatbot-backdoor.html</link>
      <pubDate>Wed, 8 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Kim Kinahan</name>
          <title>Product Marketing Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Kim Kinahan</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/how-your-chatbot-can-become-a-backdoor-optimized-1:Large?qlt=80"/>
    </item>
    <item>
      <title>A Cascade of Insecure Architectures: Axis Plugin Design Flaw Expose Select Autodesk Revit Users to Supply Chain Risk </title>
      <description>We discovered Azure Storage Account credentials exposed in Axis Communications’ Autodesk Revit plugin, allowing unauthorized modification of cloud-hosted files. This exposure, combined with vulnerabilities in Autodesk Revit, could enable supply-chain attacks targeting end users.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/axis-plugin-flaw-autodesk-revit-supply-chain-risk.html</link>
      <pubDate>Wed, 8 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Nitesh Surana</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Nitesh Surana</dc:creator>
      <trendmicro:primaryTag>Cloud</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/axispluginflaw:Large?qlt=80"/>
    </item>
    <item>
      <title>Self-Propagating Malware Spreading Via WhatsApp, Targets Brazilian Users</title>
      <description>Trend™ Research  has identified an active campaign spreading via WhatsApp through a ZIP file attachment. When executed, the malware establishes persistence and hijacks the compromised WhatsApp account to send copies of itself to the victim’s contacts. </description>
      <link>https://www.trendmicro.com/en_us/research/25/j/self-propagating-malware-spreads-via-whatsapp.html</link>
      <pubDate>Fri, 3 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jeffrey Francis Bonaobra</name>
          <title>Sr. Threat Response Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Maristel Policarpio</name>
          <title>Threat Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Sophia Nilette Robles</name>
          <title>Threat Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Cj Arsley Mateo</name>
          <title>Threat Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jacob Santos</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Paul John Bardon</name>
          <title>Threat Hunter</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Bren Matthew Ebriega</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>John Rainier Navato</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jeffrey Francis Bonaobra</dc:creator>
      <dc:creator>Maristel Policarpio</dc:creator>
      <dc:creator>Sophia Nilette Robles</dc:creator>
      <dc:creator>Cj Arsley Mateo</dc:creator>
      <dc:creator>Jacob Santos</dc:creator>
      <dc:creator>Paul John Bardon</dc:creator>
      <dc:creator>Bren Matthew Ebriega</dc:creator>
      <dc:creator>John Rainier Navato</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Phishing</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/selfpropagating-whatsapp-thumb:Large?qlt=80"/>
    </item>
    <item>
      <title>Cloud Security in the CNAPP Era: Eight Important Takeaways</title>
      <description>Eight takeaways on why Trend Vision One™ embodies the best of today’s CNAPP vision. Includes insights from 2025 Gartner® Market Guide for CNAPP</description>
      <link>https://www.trendmicro.com/en_us/research/25/i/cloud-security-cnapp.html</link>
      <pubDate>Fri, 26 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Bestin Koruthu</name>
          <title>Sr. PM Cloud Security</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Truman Coburn</name>
          <title>Sr. Product Marketing Manager</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Fernando Cardoso</name>
          <title>VP Product Management</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Bestin Koruthu</dc:creator>
      <dc:creator>Truman Coburn</dc:creator>
      <dc:creator>Fernando Cardoso</dc:creator>
      <trendmicro:primaryTag>Compliance &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Security Strategies</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/cloud-security-cnapp:Large?qlt=80"/>
    </item>
    <item>
      <title>CNAPP is the Solution to Multi-cloud Flexibility</title>
      <description>Cloud-native application protection platform (CNAPP) not only helps organizations protect, but offers the flexibility of multi-cloud.</description>
      <link>https://www.trendmicro.com/en_us/research/25/i/cnapp-multi-cloud.html</link>
      <pubDate>Fri, 26 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Bestin Koruthu</name>
          <title>Sr. PM Cloud Security</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Truman Coburn</name>
          <title>Product Marketing Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Bestin Koruthu</dc:creator>
      <dc:creator>Truman Coburn</dc:creator>
      <trendmicro:primaryTag>Cloud</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Consumer Focus</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/cnapp-campaign-blog-1:Large?qlt=80"/>
    </item>
    <item>
      <title>New LockBit 5.0 Targets Windows, Linux, ESXi </title>
      <description>Trend™ Research analyzed source binaries from the latest activity from notorious LockBit ransomware with their 5.0 version that exhibits advanced obfuscation, anti-analysis techniques, and seamless cross-platform capabilities for Windows, Linux, and ESXi systems.</description>
      <link>https://www.trendmicro.com/en_us/research/25/i/lockbit-5-targets-windows-linux-esxi.html</link>
      <pubDate>Thu, 25 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Sarah Pearl Camiling</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jacob Santos</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Sarah Pearl Camiling</dc:creator>
      <dc:creator>Jacob Santos</dc:creator>
      <trendmicro:primaryTag>Ransomware</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/lockbit5-thumb:Large?qlt=80"/>
    </item>
    <item>
      <title>This Is How Your LLM Gets Compromised</title>
      <description>Poisoned data. Malicious LoRAs. Trojan model files. AI attacks are stealthier than ever—often invisible until it’s too late. Here’s how to catch them before they catch you.</description>
      <link>https://www.trendmicro.com/en_us/research/25/i/prevent-llm-compromise.html</link>
      <pubDate>Wed, 24 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Fernando Tucci</name>
          <title>Senior Product Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Fernando Tucci</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/prevent-llm-compromise:Large?qlt=80"/>
    </item>
    <item>
      <title>Domino Effect: How One Vendor's AI App Breach Toppled Giants</title>
      <description>A single AI chatbot breach at Salesloft-Drift exposed data from 700+ companies, including security leaders. The attack shows how AI integrations expand risk, and why controls like IP allow-listing, token security, and monitoring are critical.</description>
      <link>https://www.trendmicro.com/en_us/research/25/i/ai-app-breach.html</link>
      <pubDate>Wed, 24 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Fernando Tucci</name>
          <title>Senior Product Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Fernando Tucci</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/ai-app-breach:Large?qlt=80"/>
    </item>
    <item>
      <title>AI-Powered App Exposes User Data, Creates Risk of Supply Chain Attacks</title>
      <description>Trend™ Research’s analysis of Wondershare RepairIt reveals how the AI-driven app exposed sensitive user data due to unsecure cloud storage practices and hardcoded credentials, creating risks of model tampering and supply chain attacks.</description>
      <link>https://www.trendmicro.com/en_us/research/25/i/ai-powered-app-exposes-user-data.html</link>
      <pubDate>Tue, 23 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Alfredo Oliveira</name>
          <title>Sr. Security Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>David Fiser</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Alfredo Oliveira</dc:creator>
      <dc:creator>David Fiser</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/wondershare-cover:Large?qlt=80"/>
    </item>
    <item>
      <title>How AI-Native Development Platforms Enable Fake Captcha Pages</title>
      <description>Cybercriminals are abusing AI-native platforms like Vercel, Netlify, and Lovable to host fake captcha pages that deceive users, bypass detection, and drive phishing campaigns.</description>
      <link>https://www.trendmicro.com/en_us/research/25/i/ai-development-platforms-enable-fake-captcha-pages.html</link>
      <pubDate>Fri, 19 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Ryan Flores</name>
          <title>Sr. Manager, Threat Research</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Bakuei Matsukawa</name>
          <title>Principal Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Ryan Flores</dc:creator>
      <dc:creator>Bakuei Matsukawa</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Web</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/ai-lovable-cover:Large?qlt=80"/>
    </item>
    <item>
      <title>What We Know About the NPM Supply Chain Attack</title>
      <description>Trend™ Research outlines the critical details behind the ongoing NPM supply chain attack and offers essential steps to stay protected against potential compromise. </description>
      <link>https://www.trendmicro.com/en_us/research/25/i/npm-supply-chain-attack.html</link>
      <pubDate>Thu, 18 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jeffrey Francis Bonaobra</name>
          <title>Sr. Threat Response Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Joshua Aquino</name>
          <title>Sr. Threat Response Engineer\Y Leader</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jeffrey Francis Bonaobra</dc:creator>
      <dc:creator>Joshua Aquino</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/NPM-thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>EvilAI Operators Use AI-Generated Code and Fake Apps for Far-Reaching Attacks </title>
      <description>Combining AI-generated code and social engineering, EvilAI operators are executing a rapidly expanding campaign, disguising their malware as legitimate applications to bypass security, steal credentials, and persistently compromise organizations worldwide.</description>
      <link>https://www.trendmicro.com/en_us/research/25/i/evilai.html</link>
      <pubDate>Thu, 11 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jeffrey Francis Bonaobra</name>
          <title>Sr. Threat Response Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Joshua Aquino</name>
          <title>Sr. Threat Response Engineer\Y Leader</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Emmanuel Panopio</name>
          <title>Sr. Threat Response Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Emmanuel Roll</name>
          <title>Sr. Threat Response Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Joshua Lijandro Tsang</name>
          <title>Sr. Cybersecurity Engineer\Y Leader</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Armando Nathaniel Pedragoza</name>
          <title>Sr. Threat Solution Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Melvin Singwa</name>
          <title>Sr. Threat Response Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Mohammed Malubay</name>
          <title>Sr. Cybersecurity Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Marco Dela Vega</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jeffrey Francis Bonaobra</dc:creator>
      <dc:creator>Joshua Aquino</dc:creator>
      <dc:creator>Emmanuel Panopio</dc:creator>
      <dc:creator>Emmanuel Roll</dc:creator>
      <dc:creator>Joshua Lijandro Tsang</dc:creator>
      <dc:creator>Armando Nathaniel Pedragoza</dc:creator>
      <dc:creator>Melvin Singwa</dc:creator>
      <dc:creator>Mohammed Malubay</dc:creator>
      <dc:creator>Marco Dela Vega</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/EvilAI-thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>What’s Your Cybersecurity Maturity?</title>
      <description>This blog post looks at four key milestones along the cybersecurity maturity journey and poses some questions you can ask to determine the stage of your organization’s progress.</description>
      <link>https://www.trendmicro.com/en_us/research/25/i/cybersecurity-maturity.html</link>
      <pubDate>Wed, 10 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Data center</category>
      <category>Trend Micro Research : Network</category>
      <category>Trend Micro Research : Security Strategies</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/cybersecurity-maturity:Large?qlt=80"/>
    </item>
  </channel>
</rss>