<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:trendmicro="https://www.trendmicro.com" version="2.0">
  <channel>
    <title>Trend Micro Research, News, Perspectives</title>
    <description></description>
    <link>https://www.trendmicro.com/en_us/research.html</link>
    <xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item>
      <title>U.S. Public Sector Under Siege: Threat Intelligence for Q1 2026</title>
      <description>The first quarter of 2026 has reinforced a hard truth: U.S. government agencies and educational institutions are operating in the most hostile cyber threat environment ever recorded.</description>
      <link>https://www.trendmicro.com/en_us/research/26/d/us-public-sector-under-siege.html</link>
      <pubDate>Thu, 9 Apr 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jon Clay</name>
          <title>VP, Threat Intelligence</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jon Clay</dc:creator>
      <trendmicro:primaryTag>APT &amp; Targeted Attacks</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Network</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/us-public-sector-under-siege:Large?qlt=80"/>
    </item>
    <item>
      <title>Claude Code Packaging Error Remains a Lure in an Active Campaign: What Defenders Should Do </title>
      <description>Threat actors leveraged Anthropic’s Claude Code npm release packaging error to distribute Vidar, GhostSocks, and PureLog Stealer. This blog details immediate steps organizations can take and best practices to prevent further risk.</description>
      <link>https://www.trendmicro.com/en_us/research/26/d/claude-code-remains-a-lure-what-defenders-should-do.html</link>
      <pubDate>Tue, 7 Apr 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jacob Santos</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Sophia Nilette Robles</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jacob Santos</dc:creator>
      <dc:creator>Sophia Nilette Robles</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/claude-code-still-a-lure-fig1-hero:Large?qlt=80"/>
    </item>
    <item>
      <title>TrendAI Insight: New U.S. National Cyber Strategy</title>
      <description>TrendAI reviews the White House National Cyber Strategy, outlining six pillars to strengthen U.S. cybersecurity—from deterrence and regulation to federal modernization, critical infrastructure protection, AI leadership, and workforce development.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/trendai-insight-new-us-national-cyber-strategy.html</link>
      <pubDate>Wed, 1 Apr 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jon Clay</name>
          <title>VP, Threat Intelligence</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jon Clay</dc:creator>
      <trendmicro:primaryTag>Privacy &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Network</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/trendai-insight-new-us-national-cyber-strategy-tn:Large?qlt=80"/>
    </item>
    <item>
      <title>The Real Risk of Vibecoding</title>
      <description>This blog looks at how AI‑driven vibecoding speeds up software development while increasing security risk by outpacing traditional review and ownership. It explains why security needs to move earlier and be built into modern development workflows.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/the-real-risk-of-vibecoding.html</link>
      <pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Bestin Koruthu</name>
          <title>Senior Product Management Cloud Security</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Nicolas Boutmy</name>
          <title>Senior Product Management Cloud Security</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Bestin Koruthu</dc:creator>
      <dc:creator>Nicolas Boutmy</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Data center</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/the-real-risk-of-vibecoding:Large?qlt=80"/>
    </item>
    <item>
      <title>Axios NPM Package Compromised: Supply Chain Attack Hits JavaScript HTTP Client with 100M+ Weekly Downloads</title>
      <description>A supply chain attack hit Axios when attackers used stolen npm credentials to publish malicious versions containing a phantom dependency. This triggered a cross-platform RAT during installation and replaced its files with clean decoys, making detection challenging.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/axios-npm-package-compromised.html</link>
      <pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Peter Girnus</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jacob Santos</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Peter Girnus</dc:creator>
      <dc:creator>Jacob Santos</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/axios-supply-chain-attack-thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>TrendAI™ Research at RSAC 2026: Advancing Defense Across AI‑Driven and Cyber‑Physical Threats</title>
      <description>TrendAI™ Research explored agentic AI cybercrime and EV infrastructure security through two research sessions at RSAC 2026.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/trendai-research-at-rsac-2026.html</link>
      <pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>TrendAI™ Research</name>
          <title>TrendAI™</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>TrendAI™ Research</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/RSAC1_for_thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>TeamPCP’s Telnyx Attack Marks a Shift in Tactics Beyond LiteLLM</title>
      <description>Moving beyond their LiteLLM campaign, TeamPCP weaponizes the Telnyx Python SDK with stealthy WAV‑based payloads to steal credentials across Linux, macOS, and Windows.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/teampcp-telnyx-attack-marks-a-shift-in-tactics.html</link>
      <pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>John Rainier Navato</name>
          <title>Senior Threat Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>John Rainier Navato</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/Telnyx-976:Large?qlt=80"/>
    </item>
    <item>
      <title>Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise </title>
      <description>TeamPCP orchestrated one of the most sophisticated multi-ecosystem supply chain campaigns publicly documented to date. It cascaded through developer tooling and compromised LiteLLM and exposed how AI proxy services that concentrate API keys and cloud credentials become high-value collateral when supply chain attacks compromise upstream dependencies. </description>
      <link>https://www.trendmicro.com/en_us/research/26/c/inside-litellm-supply-chain-compromise.html</link>
      <pubDate>Thu, 26 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Peter Girnus</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Fernando Tucci</name>
          <title>Senior Product Manager</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Deep Patel</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Simon Dulude</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Ashish Verma</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>John Rainier Navato</name>
          <title>Senior Threat Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Peter Girnus</dc:creator>
      <dc:creator>Fernando Tucci</dc:creator>
      <dc:creator>Deep Patel</dc:creator>
      <dc:creator>Simon Dulude</dc:creator>
      <dc:creator>Ashish Verma</dc:creator>
      <dc:creator>John Rainier Navato</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Threats</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/litellm-compromise-thumb:Large?qlt=80"/>
    </item>
    <item>
      <title>Pawn Storm Campaign Deploys PRISMEX, Targets Government and Critical Infrastructure Entities </title>
      <description>This blog discusses the steganography, cloud abuse, and email-based backdoors used against the Ukrainian defense supply chain in the latest Pawn Storm campaign that TrendAI™ Research observed and analyzed. </description>
      <link>https://www.trendmicro.com/en_us/research/26/c/pawn-storm-targets-govt-infra.html</link>
      <pubDate>Thu, 26 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Feike Hacquebord</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Hiroyuki Kakara</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Feike Hacquebord</dc:creator>
      <dc:creator>Hiroyuki Kakara</dc:creator>
      <trendmicro:primaryTag>APT &amp; Targeted Attacks</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/pawn-storm-malware:Large?qlt=80"/>
    </item>
    <item>
      <title>Your AI Stack Just Handed Over Your Root Keys: Inside the litellm PyPI Breach</title>
      <description>Litellm PyPI breach explained: malicious versions steal cloud credentials, SSH keys, and Kubernetes secrets. Learn impact and urgent mitigation steps.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/your-ai-stack-just-handed-over-your-root-keys-inside-the-litellm-pypi-breach.html</link>
      <pubDate>Wed, 25 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Fernando Tucci</name>
          <title>Senior Product Manager, AI Security</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Fernando Tucci</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <category>Trend Micro Research : Data center</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/pypi-breach-blog:Large?qlt=80"/>
    </item>
    <item>
      <title>Copyright Lures Mask a Multi‑Stage PureLog Stealer Attack on Key Industries</title>
      <description>We look into a stealthy multi‑stage attack campaign that delivers PureLog Stealer entirely in memory using encrypted, fileless techniques.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/copyright-lures-mask-a-multistage-purelog-stealer-attack.html</link>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Mohamed Fahmy</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Allixon Kristoffer Francisco</name>
          <title>Threat Intel Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jonna Santos</name>
          <title>Sr. Security Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Mohamed Fahmy</dc:creator>
      <dc:creator>Allixon Kristoffer Francisco</dc:creator>
      <dc:creator>Jonna Santos</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Investigations</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/purelog976:Large?qlt=80"/>
    </item>
    <item>
      <title>Why East-West Visibility Matters for Grid Security</title>
      <description>Learn how east-west traffic visibility helps detect and stop lateral movement attacks inside electric grid infrastructure and critical OT networks.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/why-east-west-visibility-matters-for-grid-security.html</link>
      <pubDate>Wed, 18 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Vitaliy Shtym</name>
          <title>VP, Business Strategy and Client Success</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Vitaliy Shtym</dc:creator>
      <trendmicro:primaryTag>Compliance &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Consumer Focus</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Privacy &amp; Risks</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : ICS OT</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : IoT</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Network</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/why-east-west-visibility-matters-for-grid-security-tn:Large?qlt=80"/>
    </item>
    <item>
      <title>From Misconfigured Spring Boot Actuator to SharePoint Exfiltration: How Stolen Credentials Bypass MFA</title>
      <description>Not every cloud breach starts with malware or a zero-day. In this incident, attackers discovered an exposed Spring Boot Actuator endpoint, harvested credentials from leaked configuration data, then used the OAuth2 Resource Owner Password Credentials (ROPC) flow to authenticate without MFA.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/from-misconfigured-spring-boot-actuator-to-sharepoint-exfiltrati.html</link>
      <pubDate>Wed, 18 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Ryan Soliven</name>
          <title>Sr. Incident Response Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jovit Samaniego</name>
          <title>Incident Response Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Reine Roque</name>
          <title>Sr. Security Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Ryan Soliven</dc:creator>
      <dc:creator>Jovit Samaniego</dc:creator>
      <dc:creator>Reine Roque</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Investigations</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/sharepoint-976:Large?qlt=80"/>
    </item>
    <item>
      <title>TrendAI™ Supports Global Law Enforcement Efforts</title>
      <description>Learn how TrendAI™  and our researchers contributed threat intelligence and analysis to support INTERPOL against cybercrime.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/trendai-supports-global-law-enforcement-efforts.html</link>
      <pubDate>Mon, 16 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>TrendAI™ Research</name>
          <title>TrendAI™</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>TrendAI™ Research</dc:creator>
      <trendmicro:primaryTag>Cyber Crime</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/lea-operation-img:Large?qlt=80"/>
    </item>
    <item>
      <title>Web Shells, Tunnels, and Ransomware: Dissecting a Warlock Attack</title>
      <description>Warlock continues to enhance its attack chain with new tactics to improve persistence, lateral movement, and defense evasion using an expanded toolset: TightVNC Yuze, and a persistent BYOVD technique leveraging the NSec driver.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/dissecting-a-warlock-attack.html</link>
      <pubDate>Mon, 16 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Maristel Policarpio</name>
          <title>Threat Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Junestherry Dela Cruz</name>
          <title>Senior Adversary Hunter</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Sarah Pearl Camiling</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jacob Santos</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Don Ovid Ladores</name>
          <title>Senior Engineer, Threat IR and Forensic</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Maristel Policarpio</dc:creator>
      <dc:creator>Junestherry Dela Cruz</dc:creator>
      <dc:creator>Sarah Pearl Camiling</dc:creator>
      <dc:creator>Jacob Santos</dc:creator>
      <dc:creator>Don Ovid Ladores</dc:creator>
      <trendmicro:primaryTag>Ransomware</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/dissecting-hero:Large?qlt=80"/>
    </item>
    <item>
      <title>Securing Autonomous AI Agents with TrendAI &amp; NVIDIA OpenShell</title>
      <description>Learn how TrendAI and NVIDIA OpenShell help secure autonomous AI agents and build trusted enterprise AI systems with stronger visibility and control.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/securing-autonomous-ai-agents-with-trendai-and-nvidia-openshell.html</link>
      <pubDate>Mon, 16 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Fernando Cardoso</name>
          <title>VP Product Management</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>King Cao</name>
          <title>Director, Product Management</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Truman Coburn</name>
          <title>Sr. Product Marketing</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Bestin Koruthu</name>
          <title>Sr. Product Marketing</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Fernando Cardoso</dc:creator>
      <dc:creator>King Cao</dc:creator>
      <dc:creator>Truman Coburn</dc:creator>
      <dc:creator>Bestin Koruthu</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/securing-autonomous-ai-agents-with-trendai-and-nvidia-openshell:Large?qlt=80"/>
    </item>
    <item>
      <title>Through the Lens of MDR: Analysis of KongTuke’s ClickFix Abuse of Compromised WordPress Sites</title>
      <description>Our analysis of an active KongTuke campaign deploying modeloRAT — malware capable of reconnaissance, command execution, and persistent access — through compromised WordPress sites and fake CAPTCHA lures shows that the group still operates this delivery chain in parallel with the newer CrashFix technique.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/kongtuke-clickfix-abuse-of-compromised-wordpress-sites.html</link>
      <pubDate>Tue, 10 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Aira Marcelo</name>
          <title>Incident Response Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jovit Samaniego</name>
          <title>Incident Response Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Ryan Maglaque</name>
          <title>Incident Response Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Fe Cureg</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Lisa Wu</name>
          <title>Senior Security Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Aira Marcelo</dc:creator>
      <dc:creator>Jovit Samaniego</dc:creator>
      <dc:creator>Ryan Maglaque</dc:creator>
      <dc:creator>Fe Cureg</dc:creator>
      <dc:creator>Lisa Wu</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/clickfix-976:Large?qlt=80"/>
    </item>
    <item>
      <title>CISOs in a Pinch: A Security Analysis of OpenClaw</title>
      <description>Learn about OpenClaw (a sovereign agent) and how this can be viable for enterprises.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/cisos-in-a-pinch-a-security-analysis-openclaw.html</link>
      <pubDate>Tue, 10 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Fernando Tucci</name>
          <title>Senior Product Manager, AI Security</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Fernando Tucci</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/security-analysis-of-openclaw-img:Large?qlt=80"/>
    </item>
    <item>
      <title>TrendAI™ at [un]prompted 2026: From KYC Exploits to Agentic Defense</title>
      <description>At [un]prompted 2026, TrendAI™ demonstrated how documents can be used to exploit AI-driven KYC pipelines and introduced FENRIR, an automated system for discovering AI vulnerabilities at scale.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/trendai-at-unprompted-2026.html</link>
      <pubDate>Mon, 9 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>TrendAI™ Research</name>
          <title>TrendAI™</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>TrendAI™ Research</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/unprompted-976-2:Large?qlt=80"/>
    </item>
    <item>
      <title>New BoryptGrab Stealer Targets Windows Users via Deceptive GitHub Pages</title>
      <description>The BoryptGrab campaign uses fake SEO‑optimized GitHub repositories and deceptive download pages to distribute a data‑stealing malware family that delivers multiple payloads, including a reverse SSH backdoor, to Windows users.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/boryptgrab-stealer-targets-users-via-deceptive-github-pages.html</link>
      <pubDate>Thu, 5 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Mingyue Shirley Yang</name>
          <title>Malware Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Mingyue Shirley Yang</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/AsyncRAT-cover:Large?qlt=80"/>
    </item>
    <item>
      <title> Europol, Microsoft, TrendAI™ and Collaborators Halt Tycoon 2FA Operations</title>
      <description>Tycoon 2FA was dismantled this week by law enforcement and industry partners including TrendAI™. The phishing-as-a-service platform offered MFA bypass services using adversary-in-the-middle (AitM) proxying.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/tycoon2fa-takedown.html</link>
      <pubDate>Wed, 4 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Christopher Boyton</name>
          <title>Adversary Hunter</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Mayra Rosario Fuentes</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Stephen Hilt</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Christopher Boyton</dc:creator>
      <dc:creator>Mayra Rosario Fuentes</dc:creator>
      <dc:creator>Stephen Hilt</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/phaas-takedown-thumb:Large?qlt=80"/>
    </item>
    <item>
      <title>Claude Code Security set the Cybersecurity Stocks on Fire - Here's the Signal in the Smoke</title>
      <description>Learn how Claude Code Security set Cybersecurity stocks on fire.</description>
      <link>https://www.trendmicro.com/en_us/research/26/c/claude-code-security-set-the-cybersecurity-stocks-on-fire.html</link>
      <pubDate>Tue, 3 Mar 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Fernando Tucci</name>
          <title>Senior Product Manager, AI Security</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Fernando Tucci</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/claude-code-security-img:Large?qlt=80"/>
    </item>
    <item>
      <title>Malicious OpenClaw Skills Used to Distribute Atomic macOS Stealer</title>
      <description>Malicious OpenClaw skills trick AI agents and users into installing a new AMOS variant that steals extensive data at scale.</description>
      <link>https://www.trendmicro.com/en_us/research/26/b/openclaw-skills-used-to-distribute-atomic-macos-stealer.html</link>
      <pubDate>Mon, 23 Feb 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Alfredo Oliveira</name>
          <title>Sr. Security Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Buddy Tancio</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>David Fiser</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Philippe Lin</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Roel Reyes</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Alfredo Oliveira</dc:creator>
      <dc:creator>Buddy Tancio</dc:creator>
      <dc:creator>David Fiser</dc:creator>
      <dc:creator>Philippe Lin</dc:creator>
      <dc:creator>Roel Reyes</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/amos-976:Large?qlt=80"/>
    </item>
    <item>
      <title>Spam Campaign Abuses Atlassian Jira, Targets Government and Corporate Entities</title>
      <description>We uncover how a campaign used Atlassian Jira Cloud to launch automated and targeted spam campaigns, exploiting trusted SaaS workflows to bypass security controls.</description>
      <link>https://www.trendmicro.com/en_us/research/26/b/spam-campaign-abuses-atlassian-jira.html</link>
      <pubDate>Tue, 17 Feb 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>TrendAI™ Research</name>
          <title>TrendAI™</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>TrendAI™ Research</dc:creator>
      <trendmicro:primaryTag>Spam</trendmicro:primaryTag>
      <category>Trend Micro Research : Spam</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/atlassian_spam_campaign:Large?qlt=80"/>
    </item>
    <item>
      <title>U.S. Public Sector Under Siege</title>
      <description>Discover why Government and Education must prioritize Cyber Risk Management.</description>
      <link>https://www.trendmicro.com/en_us/research/26/b/us-public-sector-under-siege.html</link>
      <pubDate>Fri, 6 Feb 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jon Clay</name>
          <title>VP, Threat Intelligence</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jon Clay</dc:creator>
      <trendmicro:primaryTag>Compliance &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/thmb-us-public-sector-under-siege-blog-img:Large?qlt=80"/>
    </item>
    <item>
      <title>Viral AI, Invisible Risks:  What OpenClaw Reveals About Agentic Assistants</title>
      <description>OpenClaw (aka Clawdbot or Moltbot) represents a new frontier in agentic AI: powerful, highly autonomous, and surprisingly easy to use. In this research, we examine how its capabilities compare to its predecessors’ and highlight the security risks inherent to the agentic AI paradigm.</description>
      <link>https://www.trendmicro.com/en_us/research/26/b/what-openclaw-reveals-about-agentic-assistants.html</link>
      <pubDate>Fri, 6 Feb 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Salvatore Gariuolo</name>
          <title>Senior Threat Researcher, Forward-Looking Threat Research Team</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Vincenzo Ciancaglini</name>
          <title>Senior Threat Researcher, Forward-Looking Threat Research Team</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Fernando Tucci</name>
          <title>Senior Project Manager, AI Security</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Salvatore Gariuolo</dc:creator>
      <dc:creator>Vincenzo Ciancaglini</dc:creator>
      <dc:creator>Fernando Tucci</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/OpenClaw-976:Large?qlt=80"/>
    </item>
    <item>
      <title>Embracing Choice in Cybersecurity: TrendAI Vision One™ and SentinelOne Integration</title>
      <description>Discover how the TrendAI Vision One and SentinelOne integration exemplifies our commitment to endpoint flexibility.</description>
      <link>https://www.trendmicro.com/en_us/research/26/a/embracing-choice-in-cybersecurity.html</link>
      <pubDate>Mon, 26 Jan 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jenny Hua</name>
          <title>Product Marketing Manager, Ecosystem</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jenny Hua</dc:creator>
      <trendmicro:primaryTag>Endpoints</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Network</category>
      <category>Trend Micro Research : Security Strategies</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/vision-one-sentinel-one-integration-blog:Large?qlt=80"/>
    </item>
    <item>
      <title>Pwn2Own: Researchers Earn $1 Million for 76 Zero-Days</title>
      <description>Discover how TrendAI Zero Day Initiative (ZDI) identified critical vulnerabilities across connected vehicles, EV chargers, and automotive systems.</description>
      <link>https://www.trendmicro.com/en_us/research/26/a/pwn2own-researchers-earn-1-million-for-76-zero-days.html</link>
      <pubDate>Mon, 26 Jan 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Trend Micro Research</name>
          <title>Trend Micro</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Trend Micro Research</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Connected Car</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/thmb-pwn2own-researchers-earn-1-million-for-76-zero-days:Large?qlt=80"/>
    </item>
    <item>
      <title>PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups</title>
      <description>PeckBirdy is a sophisticated JScript-based C&amp;C framework used by China-aligned APT groups to exploit LOLBins across multiple environments, delivering advanced backdoors to target gambling industries and Asian government entities.</description>
      <link>https://www.trendmicro.com/en_us/research/26/a/peckbirdy-script-framework.html</link>
      <pubDate>Mon, 26 Jan 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Ted Lee</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Joseph C Chen</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Ted Lee</dc:creator>
      <dc:creator>Joseph C Chen</dc:creator>
      <trendmicro:primaryTag>APT &amp; Targeted Attacks</trendmicro:primaryTag>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/peckbirdy-976:Large?qlt=80"/>
    </item>
    <item>
      <title>Watering Hole Attack Targets EmEditor Users with Information-Stealing Malware</title>
      <description>TrendAI™ Research provides a technical analysis of a compromised EmEditor installer used to deliver multistage malware that performs a range of malicious actions. </description>
      <link>https://www.trendmicro.com/en_us/research/26/a/watering-hole-attack-targets-emeditor-users.html</link>
      <pubDate>Thu, 22 Jan 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Don Ovid Ladores</name>
          <title>Senior Engineer, Threat IR and Forensic</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Yuya Sato</name>
          <title>Senior Engineer, Threat IR and Forensic</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Yosuke Akiho</name>
          <title>Senior Engineer, Threat IR and Forensic</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Don Ovid Ladores</dc:creator>
      <dc:creator>Yuya Sato</dc:creator>
      <dc:creator>Yosuke Akiho</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Cyber Risk</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/emeditor-976:Large?qlt=80"/>
    </item>
    <item>
      <title>From Extension to Infection: An In-Depth Analysis of the Evelyn Stealer Campaign Targeting Software Developers</title>
      <description>This blog entry provides an in-depth analysis of the multistage delivery of the Evelyn information stealer, which was used in a campaign targeting software developers.</description>
      <link>https://www.trendmicro.com/en_us/research/26/a/analysis-of-the-evelyn-stealer-campaign.html</link>
      <pubDate>Mon, 19 Jan 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Ahmed Mohamed Ibrahim </name>
          <title>Malware Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Ahmed Mohamed Ibrahim </dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/Evelyn-cover:Large?qlt=80"/>
    </item>
    <item>
      <title>Your 100 Billion Parameter Behemoth is a Liability</title>
      <description>The "bigger is better" era of AI is hitting a wall. We are in an LLM bubble, characterized by ruinous inference costs and diminishing returns. The future belongs to Agentic AI powered by specialized Small Language Models (SLMs). Think of it as a shift from hiring a single expensive genius to running a highly efficient digital factory. It’s cheaper, faster, and frankly, the only way to make agents work at scale.</description>
      <link>https://www.trendmicro.com/en_us/research/26/a/your-100-billion-parameter-behemoth-is-a-liability.html</link>
      <pubDate>Fri, 16 Jan 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Fernando Tucci</name>
          <title>Senior Product Manager, AI Security</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Fernando Tucci</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Data center</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/your-100-billion-parameter-behemoth-is-a-liability:Large?qlt=80"/>
    </item>
    <item>
      <title>Introducing ÆSIR: Finding Zero-Day Vulnerabilities at the Speed of AI</title>
      <description>TrendAI™’s ÆSIR platform combines AI automation with expert oversight to discover zero-day vulnerabilities in AI infrastructure – 21 CVEs across NVIDIA, Tencent, and MLflow since mid-2025.</description>
      <link>https://www.trendmicro.com/en_us/research/26/a/aesir.html</link>
      <pubDate>Thu, 15 Jan 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Peter Girnus</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Peter Girnus</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/AESIR_thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>Key Insights on SHADOW-AETHER-015 and Earth Preta from the 2025 MITRE ATT&amp;CK Evaluation with TrendAI Vision One™ </title>
      <description>This blog discusses notable modern TTPs observed from SHADOW-AETHER-015 and Earth Preta, from TrendAI™ Research monitoring and TrendAI Vision One™ intelligence. These findings support the performance of TrendAI™ in the 2025 MITRE ATT&amp;CK Evaluations.  </description>
      <link>https://www.trendmicro.com/en_us/research/26/a/shadow-aether-015-earth-preta-mitre.html</link>
      <pubDate>Tue, 13 Jan 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/shadow-aether-earth-preta_thumb:Large?qlt=80"/>
    </item>
    <item>
      <title>Analyzing a Multi-Stage AsyncRAT Campaign via Managed Detection and Response</title>
      <description>Threat actors exploited Cloudflare's free-tier infrastructure and legitimate Python environments to deploy the AsyncRAT remote access trojan, demonstrating advanced evasion techniques that abuse trusted cloud services for malicious operations.</description>
      <link>https://www.trendmicro.com/en_us/research/26/a/analyzing-a-a-multi-stage-asyncrat-campaign-via-mdr.html</link>
      <pubDate>Mon, 12 Jan 2026 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Buddy Tancio</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jed Valderama</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Khristoffer Jocson</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Franklynn Uy</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Buddy Tancio</dc:creator>
      <dc:creator>Jed Valderama</dc:creator>
      <dc:creator>Khristoffer Jocson</dc:creator>
      <dc:creator>Franklynn Uy</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/asyncrat-cover:Large?qlt=80"/>
    </item>
    <item>
      <title>Get Executives on board with managing Cyber Risk</title>
      <description>Learn how the 2025 Trend Micro Defenders Survey Report helps paint a clear picture of how security teams are looking to work with executive leaders to manage cyber risk.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/managing-cyber-risk-with-executives.html</link>
      <pubDate>Mon, 29 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Compliance &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Annual Predictions</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/executives-managing-cyber-risk-blog-img:Large?qlt=80"/>
    </item>
    <item>
      <title>Trend Micro's Pivotal Role in INTERPOL's Operation Sentinel: Dismantling Digital Extortion Networks Across Africa</title>
      <description>Continuing a Legacy of Successful Collaboration</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/operation-sentinel-digital-extortion-campaigns-identified.html</link>
      <pubDate>Mon, 29 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Cyber Crime</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/operation-sentinel:Large?qlt=80"/>
    </item>
    <item>
      <title>What Does it Take to Manage Cloud Risk?</title>
      <description>Learn why hybrid and multi-cloud environments are vital for IT and business success from our 2025 Trend Micro Defenders Survey.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/managing-cloud-risk.html</link>
      <pubDate>Mon, 22 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Compliance &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Annual Predictions</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/what-it-takes-to-manage-cloud-risk-blog-thmb:Large?qlt=80"/>
    </item>
    <item>
      <title>What Cyber Defenders Really Think About AI Risk</title>
      <description>Learn how Trend Micro's 2025 Trend Micro Defenders Survey Report highlights current AI-related cybersecurity priorities and where security professionals use AI to their advantage.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/cyber-defenders-and-ai-risks.html</link>
      <pubDate>Thu, 18 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Annual Predictions</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/cyber-defenders-and-ai-risks-blog-thmb:Large?qlt=80"/>
    </item>
    <item>
      <title>Enhancing Security Awareness with Cyber Risk Exposure Management</title>
      <description>Learn how to strategically tackle human risk for smarter prioritization and lasting behavioral change.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/optimize-security-management-in-cyber-risk-exposure-management.html</link>
      <pubDate>Mon, 15 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Sanjana Sadh</name>
          <title>Trend Micro</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Sanjana Sadh</dc:creator>
      <trendmicro:primaryTag>Phishing</trendmicro:primaryTag>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Security Strategies</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/how-to-make-people-part-of-your-security-strategy-blog-img:Large?qlt=80"/>
    </item>
    <item>
      <title>Cyber Risk Management: Defenders Tell It Like It Is</title>
      <description>Based on more than 3,000 responses from cybersecurity professionals in nearly 90 countries, our Trend Micro Defenders Survey Report 2025 shines a bright light on the current state of cyber risk management. From the impact of cloud and AI on IT environments to top technical and human challenges, this year’s findings have a lot to say about the pressures security teams are under and what organizations are doing to tighten their grip on cyber risk.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/trend-micros-2025-defenders-survey-report.html</link>
      <pubDate>Mon, 15 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Compliance &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Report</category>
      <category>Trend Micro Research : Annual Predictions</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/trend-micros-2025-defenders-survey-report:Large?qlt=80"/>
    </item>
    <item>
      <title>SHADOW-VOID-042 Targets Multiple Industries with Void Rabisu-like Tactics</title>
      <description>In November, a targeted spear-phishing campaign was observed using Trend Micro-themed lures against various industries, but this was quickly detected and thwarted by the Trend Vision One™ platform.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/SHADOW-VOID-042.html</link>
      <pubDate>Thu, 11 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Daniel Lunghi</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Ian Kenefick</name>
          <title>Senior Adversary Hunter</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Feike Hacquebord</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Daniel Lunghi</dc:creator>
      <dc:creator>Ian Kenefick</dc:creator>
      <dc:creator>Feike Hacquebord</dc:creator>
      <trendmicro:primaryTag>Phishing</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/SHADOW-VOID-042_thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>Trend Vision One™ Integration with AWS Security Hub CSPM: Unifying Cloud Security</title>
      <description>The integration between Trend Vision One and Security Hub CSPM is exactly that, two powerful platforms enhancing each other to keep your AWS infrastructure protected.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/aws-security-hub-integration.html</link>
      <pubDate>Wed, 10 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Eduardo Castro</name>
          <title>Product Management</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Yessenia Becerra</name>
          <title>Technical Leader</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Dave McDuff</name>
          <title>Senior Product Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Eduardo Castro</dc:creator>
      <dc:creator>Yessenia Becerra</dc:creator>
      <dc:creator>Dave McDuff</dc:creator>
      <trendmicro:primaryTag>Compliance &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : How To</category>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Deep Web</category>
      <category>Trend Micro Research : Privacy &amp; Risks</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Spam</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/aws-security-hub-integration:Large?qlt=80"/>
    </item>
    <item>
      <title>Trend Vision One™ Stacks Up Against Scattered Spider and Mustang Panda in 2025 MITRE ATT&amp;CK® Evaluations</title>
      <description>Enterprise 2025 introduces the first full cloud adversary emulation and expanded multi-platform testing, focusing on two advanced threat areas: Scattered Spider’s cloud-centric attacks and Mustang Panda’s long-term espionage operations.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/cloud-automation-2025-mitre-attack-round-7.html</link>
      <pubDate>Wed, 10 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Cloud</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Privacy &amp; Risks</category>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : IoT</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/cloud-automation-2025-mitre-attack-round-7:Large?qlt=80"/>
    </item>
    <item>
      <title>CVE-2025-55182: React2Shell Analysis, Proof-of-Concept Chaos, and In-the-Wild Exploitation </title>
      <description>CVE-2025-55182 is a CVSS 10.0 pre-authentication RCE affecting React Server Components. Amid the flood of fake proof-of-concept exploits, scanners, exploits, and widespread misconceptions, this technical analysis intends to cut through the noise.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/CVE-2025-55182-analysis-poc-itw.html</link>
      <pubDate>Wed, 10 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Peter Girnus</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Deep Patel</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jack Walsh</name>
          <title>Adversary Hunter</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Lucas Silva</name>
          <title>Incident Response Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Ashish Verma</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Peter Girnus</dc:creator>
      <dc:creator>Deep Patel</dc:creator>
      <dc:creator>Jack Walsh</dc:creator>
      <dc:creator>Lucas Silva</dc:creator>
      <dc:creator>Ashish Verma</dc:creator>
      <trendmicro:primaryTag>Exploits &amp; Vulnerabilities</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/CVE-2025-55182-thumb:Large?qlt=80"/>
    </item>
    <item>
      <title>AI-Automated Threat Hunting Brings GhostPenguin Out of the Shadows</title>
      <description>In this blog entry, Trend™ Research provides a comprehensive breakdown of GhostPenguin, a previously undocumented Linux backdoor with low detection rates that was discovered through AI-powered threat hunting and in-depth malware analysis.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/ghostpenguin.html</link>
      <pubDate>Mon, 8 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Aliakbar Zahravi</name>
          <title>Staff Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Aliakbar Zahravi</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/GhostPenguin_thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>Critical React Server Components Vulnerability CVE-2025-55182: What Security Teams Need to Know</title>
      <description>CVE-2025-55182 is a critical (CVSS 10.0) pre-authentication remote code execution vulnerability affecting React Server Components used in React.js, Next.js, and related frameworks (see the context section for a more exhaustive list of affected frameworks).</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/critical-react-server-components-vulnerability.html</link>
      <pubDate>Fri, 5 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Peter Girnus</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Peter Girnus</dc:creator>
      <trendmicro:primaryTag>Exploits &amp; Vulnerabilities</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/critical-react-server-components-vulnerability-tn:Large?qlt=80"/>
    </item>
    <item>
      <title>Project View: A New Era of Prioritized and Actionable Cloud Security</title>
      <description>In today's cloud-first world, security teams face an overwhelming flood of alerts, fragmented visibility, and reactive workflows. The complexity of modern cloud environments—spanning multi-cloud deployments, ephemeral assets, and decentralized ownership—demands a new approach to risk management.</description>
      <link>https://www.trendmicro.com/en_us/research/25/k/cloud-risk-management.html</link>
      <pubDate>Thu, 4 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Truman Coburn</name>
          <title>Sr. Product Marketing Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Truman Coburn</dc:creator>
      <trendmicro:primaryTag>Compliance &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : How To</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/cloud-risk-management-1:Large?qlt=80"/>
    </item>
    <item>
      <title>PureRAT Campaign Targets Job Seekers, Abuses Foxit PDF Reader for DLL Side-loading</title>
      <description>Job seekers looking out for opportunities might instead find their personal devices compromised, as a PureRAT campaign propagated through email leverages Foxit PDF Reader for concealment and DLL side-loading for initial entry.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/valleyrat-campaign.html</link>
      <pubDate>Wed, 3 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Sarah Pearl Camiling</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Junestherry Dela Cruz</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jacob Santos</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Sophia Nilette Robles</name>
          <title>Threat Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Maristel Policarpio</name>
          <title>Threat Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Raymart Yambot</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Sarah Pearl Camiling</dc:creator>
      <dc:creator>Junestherry Dela Cruz</dc:creator>
      <dc:creator>Jacob Santos</dc:creator>
      <dc:creator>Sophia Nilette Robles</dc:creator>
      <dc:creator>Maristel Policarpio</dc:creator>
      <dc:creator>Raymart Yambot</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/valleyrat_thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>Unraveling Water Saci's New Multi-Format, AI-Enhanced Attacks Propagated via WhatsApp</title>
      <description>Through AI-driven code conversion and a layered infection chain involving different file formats and scripting languages, the threat actors behind Water Saci are quickly upgrading their malware delivery and propagation methods across WhatsApp in Brazil.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/water-saci.html</link>
      <pubDate>Tue, 2 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jeffrey Francis Bonaobra</name>
          <title>Senior Threat Response Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Sarah Pearl Camiling</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Joe Soares</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Byron Gelera</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Ian Kenefick</name>
          <title>Senior Adversary Hunter</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Emmanuel Panopio</name>
          <title>Senior Threat Response Engineer</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jeffrey Francis Bonaobra</dc:creator>
      <dc:creator>Sarah Pearl Camiling</dc:creator>
      <dc:creator>Joe Soares</dc:creator>
      <dc:creator>Byron Gelera</dc:creator>
      <dc:creator>Ian Kenefick</dc:creator>
      <dc:creator>Emmanuel Panopio</dc:creator>
      <trendmicro:primaryTag>Phishing</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/WaterSaci_thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>What’s your CNAPP maturity?</title>
      <description>More and more enterprises are opting for cloud-native application protection platforms (CNAPPs) instead of complex and hard-to-manage cloud security point solutions. Find out where your organization is on its CNAPP maturity journey.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/whats-your-cnapp-maturity.html</link>
      <pubDate>Mon, 1 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Consumer Focus</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Deep Web</category>
      <category>Trend Micro Research : Privacy &amp; Risks</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Spam</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/whats-your-cnapp-maturity:Large?qlt=80"/>
    </item>
    <item>
      <title>Elevate Your Cloud Security Strategy</title>
      <description>Learn to elevate your cloud security strategy &amp; overcome complexity with Vision One™.</description>
      <link>https://www.trendmicro.com/en_us/research/25/l/cloud-security-strategy.html</link>
      <pubDate>Mon, 1 Dec 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Eduardo Castro</name>
          <title>Product Management</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Truman Coburn</name>
          <title>Sr. Product Marketing Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Eduardo Castro</dc:creator>
      <dc:creator>Truman Coburn</dc:creator>
      <trendmicro:primaryTag>Compliance &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Security Strategies</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Deep Web</category>
      <category>Trend Micro Research : Privacy &amp; Risks</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Spam</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/cloud-security-strategy-2:Large?qlt=80"/>
    </item>
    <item>
      <title>Shai-hulud 2.0 Campaign Targets Cloud and Developer Ecosystems </title>
      <description>Shai-hulud 2.0 campaign features a sophisticated variant capable of stealing credentials and secrets from major cloud platforms and developer services, while automating the backdooring of NPM packages maintained by victims. Its advanced tactics enable rapid, stealthy propagation across the software supply chain, putting countless downstream users at risk.</description>
      <link>https://www.trendmicro.com/en_us/research/25/k/shai-hulud-2-0-targets-cloud-and-developer-systems.html</link>
      <pubDate>Thu, 27 Nov 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jeffrey Francis Bonaobra</name>
          <title>Senior Threat Response Engineer</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jeffrey Francis Bonaobra</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/shaihulud2-thumb:Large?qlt=80"/>
    </item>
    <item>
      <title>Trend &amp; AWS Partner on Cloud IPS: One-Click Protection</title>
      <description>In the race to secure cloud infrastructure, intrusion prevention systems (IPS) remain one of the most critical yet complex at the cloud network layer of defense. For many organizations, deploying IPS in the cloud is a balancing act between agility and control.</description>
      <link>https://www.trendmicro.com/en_us/research/25/k/cloud-ips-one-click-protection.html</link>
      <pubDate>Thu, 20 Nov 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Bestin Koruthu</name>
          <title>Sr. PM Cloud Security</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Bestin Koruthu</dc:creator>
      <trendmicro:primaryTag>Exploits &amp; Vulnerabilities</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Deep Web</category>
      <category>Trend Micro Research : Privacy &amp; Risks</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Spam</category>
      <category>Trend Micro Research : Network</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/cloud-ips-one-click-protection:Large?qlt=80"/>
    </item>
    <item>
      <title>Breaking Down S3 Ransomware: Variants, Attack Paths and Trend Vision One™ Defenses</title>
      <description>In this blog entry, Trend™ Research explores how ransomware actors are shifting their focus to cloud-based assets, including the tactics used to compromise business-critical data in AWS environments.</description>
      <link>https://www.trendmicro.com/en_us/research/25/k/s3-ransomware.html</link>
      <pubDate>Tue, 18 Nov 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Yash Verma</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Yash Verma</dc:creator>
      <trendmicro:primaryTag>Ransomware</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/S3Ransomware_thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>Redefining Enterprise Defense in the Era of AI-Led Cyberattacks </title>
      <description>More cybercriminals are turning to using autonomous AI tools to upgrade their attacks, as exemplified by the recent utilization of Anthropic’s Claude Code, prompting an urgent need for enterprises to adopt agentic AI-driven security platforms and proactive defenses to counter AI-related threats. </description>
      <link>https://www.trendmicro.com/en_us/research/25/k/redefining-defense-in-era-of-ai-led-attacks.html</link>
      <pubDate>Fri, 14 Nov 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Cyber Risk</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/redefining-defense-in-ai-led-cyberattacks-hero:Large?qlt=80"/>
    </item>
    <item>
      <title>Increase in Lumma Stealer Activity Coincides with Use of Adaptive Browser Fingerprinting Tactics</title>
      <description>In this blog entry, Trend™ Research analyses the layered command-and-control approaches that Lumma Stealer uses to maintain its ongoing operations while enhancing collection of victim-environment data. </description>
      <link>https://www.trendmicro.com/en_us/research/25/k/lumma-stealer-browser-fingerprinting.html</link>
      <pubDate>Thu, 13 Nov 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Junestherry Dela Cruz</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Sarah Pearl Camiling</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Junestherry Dela Cruz</dc:creator>
      <dc:creator>Sarah Pearl Camiling</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/Lumma_browser_fingerprinting:Large?qlt=80"/>
    </item>
    <item>
      <title>From Data Loss Prevention (DLP) to Modern Data Security</title>
      <description>It’s time to rethink your approach</description>
      <link>https://www.trendmicro.com/en_us/research/25/k/dlp-to-modern-data-security.html</link>
      <pubDate>Wed, 12 Nov 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Consumer Focus</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Privacy &amp; Risks</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Data center</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/dlp-to-modern-data-security:Large?qlt=80"/>
    </item>
    <item>
      <title>IBM Infrastructure: Continuous Risk &amp; Compliance</title>
      <description>Learn all about AI-powered visibility, telemetry, and proactive security across mainframe, cloud, containers, and enterprise workloads.</description>
      <link>https://www.trendmicro.com/en_us/research/25/k/ibm-infrastructure-continuous-risk-compliance.html</link>
      <pubDate>Wed, 12 Nov 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Cloud</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Data center</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/ibm-infrastructure-continuous-risk-compliance:Large?qlt=80"/>
    </item>
    <item>
      <title>How are you managing cloud risk?</title>
      <description>Learn why managing cloud risk demands unified visibility, continuous risk assessment, and efficient security operations. Discover how a full-featured CNAPP like Trend Vision One™ Cloud Security enables organizations to move from reactive to proactive cloud protection.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/manage-cloud-risk.html</link>
      <pubDate>Fri, 31 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Bestin Koruthu</name>
          <title>Sr. PM Cloud Security</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Truman Coburn</name>
          <title>Sr. Product Marketing Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Bestin Koruthu</dc:creator>
      <dc:creator>Truman Coburn</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Cyber Risk</category>
      <category>Trend Micro Research : Security Strategies</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Deep Web</category>
      <category>Trend Micro Research : Privacy &amp; Risks</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Risk Management</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Spam</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/manage-cloud-risk:Large?qlt=80"/>
    </item>
    <item>
      <title>AI Security: NVIDIA BlueField Now with Vision One™</title>
      <description>Launching at NVIDIA GTC 2025 - Transforming AI Security with Trend Vision One™ on NVIDIA BlueField</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/ai-security-nvidia-bluefield.html</link>
      <pubDate>Tue, 28 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Fernando Cardoso</name>
          <title>VP Product Management</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Eduardo Castro</name>
          <title>Trend Micro</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Nancy Chuang</name>
          <title>Trend Micro</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Fernando Cardoso</dc:creator>
      <dc:creator>Eduardo Castro</dc:creator>
      <dc:creator>Nancy Chuang</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Web</category>
      <category>Trend Micro Research : Connected Car</category>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Social Media</category>
      <category>Trend Micro Research : Smart Home</category>
      <category>Trend Micro Research : Data center</category>
      <category>Trend Micro Research : ICS OT</category>
      <category>Trend Micro Research : IoT</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Mobile</category>
      <category>Trend Micro Research : Network</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/ai-security-nvidia-bluefield:Large?qlt=80"/>
    </item>
    <item>
      <title>Active Water Saci Campaign Spreading Via WhatsApp Features Multi-Vector Persistence and Sophisticated C&amp;C</title>
      <description>Continuous investigation on the Water Saci campaign reveals innovative email-based C&amp;C system, multi-vector persistence, and real-time command capabilities that allow attackers to orchestrate coordinated botnet operations, gather detailed campaign intelligence, and dynamically control malware activity across multiple infected machines.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/active-water-saci-campaign-whatsapp-update.html</link>
      <pubDate>Mon, 27 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jeffrey Francis Bonaobra</name>
          <title>Senior Threat Response Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Joe Soares</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Emmanuel Panopio</name>
          <title>Senior Threat Response Engineer</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jeffrey Francis Bonaobra</dc:creator>
      <dc:creator>Joe Soares</dc:creator>
      <dc:creator>Emmanuel Panopio</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/whatsapp-update-thumb:Large?qlt=80"/>
    </item>
    <item>
      <title>Agenda Ransomware Deploys Linux Variant on Windows Systems Through Remote Management Tools and BYOVD Techniques</title>
      <description>Trend™ Research identified a sophisticated Agenda ransomware attack that deployed a Linux variant on Windows systems. This cross-platform execution can make detection challenging for enterprises.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/agenda-ransomware-deploys-linux-variant-on-windows-systems.html</link>
      <pubDate>Thu, 23 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jacob Santos</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Junestherry Dela Cruz</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Sarah Pearl Camiling</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Sophia Nilette Robles</name>
          <title>Threat Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Maristel Policarpio</name>
          <title>Threat Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Raymart Yambot</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jacob Santos</dc:creator>
      <dc:creator>Junestherry Dela Cruz</dc:creator>
      <dc:creator>Sarah Pearl Camiling</dc:creator>
      <dc:creator>Sophia Nilette Robles</dc:creator>
      <dc:creator>Maristel Policarpio</dc:creator>
      <dc:creator>Raymart Yambot</dc:creator>
      <trendmicro:primaryTag>Ransomware</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/agenda-thumb:Large?qlt=80"/>
    </item>
    <item>
      <title>Trend Micro Recognized as a Leader in The Forrester Wave™ 2025 for NAV</title>
      <description>Unified visibility, proactive intelligence, and proven leadership in network analysis and visibility.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/forrester-wave-nav-2025.html</link>
      <pubDate>Wed, 22 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jamal Bethea</name>
          <title>Product Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jamal Bethea</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Network</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/forrester-wave-nav-2025:Large?qlt=80"/>
    </item>
    <item>
      <title>The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns</title>
      <description>Trend™ Research examines the complex collaborative relationship between China-aligned APT groups via the new “Premier Pass-as-a-Service” model, exemplified by the recent activities of Earth Estries and Earth Naga.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/premier-pass-as-a-service.html</link>
      <pubDate>Wed, 22 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Daniel Lunghi</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Leon M Chang</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Daniel Lunghi</dc:creator>
      <dc:creator>Leon M Chang</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/PremierPass-thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>How Trend Micro Empowers the SOC with Agentic SIEM</title>
      <description>By delivering both XDR leadership and Agentic SIEM innovation under one platform, Trend is redefining what security operations can be.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/soc-agentic-siem.html</link>
      <pubDate>Tue, 21 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Joyce Huang</name>
          <title>Senior Product Marketing Manager</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Stephanie Tang</name>
          <title>Product Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Joyce Huang</dc:creator>
      <dc:creator>Stephanie Tang</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Consumer Focus</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/soc-agentic-siem:Large?qlt=80"/>
    </item>
    <item>
      <title>Fast, Broad, and Elusive: How Vidar Stealer 2.0 Upgrades Infostealer Capabilities</title>
      <description>Trend™ Research examines the latest version of the Vidar stealer, which features a full rewrite in C, a multithreaded architecture, and several enhancements that warrant attention. Its timely evolution suggests that Vidar is positioning itself to occupy the space left after Lumma Stealer’s decline.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/how-vidar-stealer-2-upgrades-infostealer-capabilities.html</link>
      <pubDate>Tue, 21 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Junestherry Dela Cruz</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Junestherry Dela Cruz</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/vidar_stealer_v2:Large?qlt=80"/>
    </item>
    <item>
      <title>Shifts in the Underground: The Impact of Water Kurita’s (Lumma Stealer) Doxxing</title>
      <description>A targeted underground doxxing campaign exposed alleged core members of Lumma Stealer (Water Kurita), resulting in a sharp decline in its activity and a migration of customers to rival infostealer platforms.



</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/the-impact-of-water-kurita-lumma-stealer-doxxing.html</link>
      <pubDate>Thu, 16 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Junestherry Dela Cruz</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Junestherry Dela Cruz</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/lumma_stealer_cover-1:Large?qlt=80"/>
    </item>
    <item>
      <title>Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits </title>
      <description>Trend™ Research has uncovered an attack campaign exploiting the Cisco SNMP vulnerability CVE-2025-20352, allowing remote code execution and rootkit deployment on unprotected devices, with impacts observed on Cisco 9400, 9300, and legacy 3750G series.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/operation-zero-disco-cisco-snmp-vulnerability-exploit.html</link>
      <pubDate>Wed, 15 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Dove Chiu</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Lucien Chuang</name>
          <title>Technical Consultant</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Dove Chiu</dc:creator>
      <dc:creator>Lucien Chuang</dc:creator>
      <trendmicro:primaryTag>Exploits &amp; Vulnerabilities</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/thumb-disco:Large?qlt=80"/>
    </item>
    <item>
      <title> Trend Micro launches new integration with Zscaler to deliver real-time,  Risk-Based Zero Trust Access</title>
      <description>Discover how Trend Vision One™ integrates with Zscaler to unify detection and access enforcement, accelerate threat containment, reduce dwell time, and deliver seamless Zero Trust protection for modern enterprises.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/real-time-risk-based-zero-trust.html</link>
      <pubDate>Tue, 14 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jenny Hua</name>
          <title>Product Marketing Manager, Ecosystem</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jenny Hua</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Network</category>
      <category>Trend Micro Research : Security Strategies</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/real-time-risk-based-zero-trust:Large?qlt=80"/>
    </item>
    <item>
      <title>RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits</title>
      <description>Trend™ Research and ZDI Threat Hunters have identified a large-scale RondoDox botnet campaign exploiting over 50 vulnerabilities across more than 30 vendors, including flaws first seen in Pwn2Own contests.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/rondodox.html</link>
      <pubDate>Thu, 9 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Deep Patel</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Ashish Verma</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Simon Dulude</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Peter Girnus</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Deep Patel</dc:creator>
      <dc:creator>Ashish Verma</dc:creator>
      <dc:creator>Simon Dulude</dc:creator>
      <dc:creator>Peter Girnus</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/RondoDox-thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>Weaponized AI Assistants &amp; Credential Thieves</title>
      <description>Learn the state of AI and the NPM ecosystem with the recent s1ngularity' weaponized AI for credential theft.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/weaponized-ai-assistants.html</link>
      <pubDate>Thu, 9 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Fernando Tucci</name>
          <title>Senior Product Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Fernando Tucci</dc:creator>
      <trendmicro:primaryTag>APT &amp; Targeted Attacks</trendmicro:primaryTag>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/the-new-face-of-automated-attacks-tb:Large?qlt=80"/>
    </item>
    <item>
      <title>How Your AI Chatbot Can Become a Backdoor</title>
      <description>In this post of THE AI BREACH, learn how your Chatbot can become a backdoor.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/ai-chatbot-backdoor.html</link>
      <pubDate>Wed, 8 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Kim Kinahan</name>
          <title>Product Marketing Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Kim Kinahan</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/how-your-chatbot-can-become-a-backdoor-optimized-1:Large?qlt=80"/>
    </item>
    <item>
      <title>A Cascade of Insecure Architectures: Axis Plugin Design Flaw Expose Select Autodesk Revit Users to Supply Chain Risk </title>
      <description>We discovered Azure Storage Account credentials exposed in Axis Communications’ Autodesk Revit plugin, allowing unauthorized modification of cloud-hosted files. This exposure, combined with vulnerabilities in Autodesk Revit, could enable supply-chain attacks targeting end users.</description>
      <link>https://www.trendmicro.com/en_us/research/25/j/axis-plugin-flaw-autodesk-revit-supply-chain-risk.html</link>
      <pubDate>Wed, 8 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Nitesh Surana</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Nitesh Surana</dc:creator>
      <trendmicro:primaryTag>Cloud</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/axispluginflaw:Large?qlt=80"/>
    </item>
    <item>
      <title>Self-Propagating Malware Spreading Via WhatsApp, Targets Brazilian Users</title>
      <description>Trend™ Research  has identified an active campaign spreading via WhatsApp through a ZIP file attachment. When executed, the malware establishes persistence and hijacks the compromised WhatsApp account to send copies of itself to the victim’s contacts. </description>
      <link>https://www.trendmicro.com/en_us/research/25/j/self-propagating-malware-spreads-via-whatsapp.html</link>
      <pubDate>Fri, 3 Oct 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jeffrey Francis Bonaobra</name>
          <title>Sr. Threat Response Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Maristel Policarpio</name>
          <title>Threat Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Sophia Nilette Robles</name>
          <title>Threat Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Cj Arsley Mateo</name>
          <title>Threat Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jacob Santos</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Paul John Bardon</name>
          <title>Threat Hunter</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Bren Matthew Ebriega</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>John Rainier Navato</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jeffrey Francis Bonaobra</dc:creator>
      <dc:creator>Maristel Policarpio</dc:creator>
      <dc:creator>Sophia Nilette Robles</dc:creator>
      <dc:creator>Cj Arsley Mateo</dc:creator>
      <dc:creator>Jacob Santos</dc:creator>
      <dc:creator>Paul John Bardon</dc:creator>
      <dc:creator>Bren Matthew Ebriega</dc:creator>
      <dc:creator>John Rainier Navato</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Phishing</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/selfpropagating-whatsapp-thumb:Large?qlt=80"/>
    </item>
    <item>
      <title>Cloud Security in the CNAPP Era: Eight Important Takeaways</title>
      <description>Eight takeaways on why Trend Vision One™ embodies the best of today’s CNAPP vision. Includes insights from 2025 Gartner® Market Guide for CNAPP</description>
      <link>https://www.trendmicro.com/en_us/research/25/i/cloud-security-cnapp.html</link>
      <pubDate>Fri, 26 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Bestin Koruthu</name>
          <title>Sr. PM Cloud Security</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Truman Coburn</name>
          <title>Sr. Product Marketing Manager</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Fernando Cardoso</name>
          <title>VP Product Management</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Bestin Koruthu</dc:creator>
      <dc:creator>Truman Coburn</dc:creator>
      <dc:creator>Fernando Cardoso</dc:creator>
      <trendmicro:primaryTag>Compliance &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Security Strategies</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/cloud-security-cnapp:Large?qlt=80"/>
    </item>
    <item>
      <title>CNAPP is the Solution to Multi-cloud Flexibility</title>
      <description>Cloud-native application protection platform (CNAPP) not only helps organizations protect, but offers the flexibility of multi-cloud.</description>
      <link>https://www.trendmicro.com/en_us/research/25/i/cnapp-multi-cloud.html</link>
      <pubDate>Fri, 26 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Bestin Koruthu</name>
          <title>Sr. PM Cloud Security</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Truman Coburn</name>
          <title>Product Marketing Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Bestin Koruthu</dc:creator>
      <dc:creator>Truman Coburn</dc:creator>
      <trendmicro:primaryTag>Cloud</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Consumer Focus</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/cnapp-campaign-blog-1:Large?qlt=80"/>
    </item>
    <item>
      <title>New LockBit 5.0 Targets Windows, Linux, ESXi </title>
      <description>Trend™ Research analyzed source binaries from the latest activity from notorious LockBit ransomware with their 5.0 version that exhibits advanced obfuscation, anti-analysis techniques, and seamless cross-platform capabilities for Windows, Linux, and ESXi systems.</description>
      <link>https://www.trendmicro.com/en_us/research/25/i/lockbit-5-targets-windows-linux-esxi.html</link>
      <pubDate>Thu, 25 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Sarah Pearl Camiling</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jacob Santos</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Sarah Pearl Camiling</dc:creator>
      <dc:creator>Jacob Santos</dc:creator>
      <trendmicro:primaryTag>Ransomware</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/lockbit5-thumb:Large?qlt=80"/>
    </item>
    <item>
      <title>This Is How Your LLM Gets Compromised</title>
      <description>Poisoned data. Malicious LoRAs. Trojan model files. AI attacks are stealthier than ever—often invisible until it’s too late. Here’s how to catch them before they catch you.</description>
      <link>https://www.trendmicro.com/en_us/research/25/i/prevent-llm-compromise.html</link>
      <pubDate>Wed, 24 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Fernando Tucci</name>
          <title>Senior Product Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Fernando Tucci</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/prevent-llm-compromise:Large?qlt=80"/>
    </item>
    <item>
      <title>Domino Effect: How One Vendor's AI App Breach Toppled Giants</title>
      <description>A single AI chatbot breach at Salesloft-Drift exposed data from 700+ companies, including security leaders. The attack shows how AI integrations expand risk, and why controls like IP allow-listing, token security, and monitoring are critical.</description>
      <link>https://www.trendmicro.com/en_us/research/25/i/ai-app-breach.html</link>
      <pubDate>Wed, 24 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Fernando Tucci</name>
          <title>Senior Product Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Fernando Tucci</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/ai-app-breach:Large?qlt=80"/>
    </item>
    <item>
      <title>AI-Powered App Exposes User Data, Creates Risk of Supply Chain Attacks</title>
      <description>Trend™ Research’s analysis of Wondershare RepairIt reveals how the AI-driven app exposed sensitive user data due to unsecure cloud storage practices and hardcoded credentials, creating risks of model tampering and supply chain attacks.</description>
      <link>https://www.trendmicro.com/en_us/research/25/i/ai-powered-app-exposes-user-data.html</link>
      <pubDate>Tue, 23 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Alfredo Oliveira</name>
          <title>Sr. Security Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>David Fiser</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Alfredo Oliveira</dc:creator>
      <dc:creator>David Fiser</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/wondershare-cover:Large?qlt=80"/>
    </item>
    <item>
      <title>How AI-Native Development Platforms Enable Fake Captcha Pages</title>
      <description>Cybercriminals are abusing AI-native platforms like Vercel, Netlify, and Lovable to host fake captcha pages that deceive users, bypass detection, and drive phishing campaigns.</description>
      <link>https://www.trendmicro.com/en_us/research/25/i/ai-development-platforms-enable-fake-captcha-pages.html</link>
      <pubDate>Fri, 19 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Ryan Flores</name>
          <title>Sr. Manager, Threat Research</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Bakuei Matsukawa</name>
          <title>Principal Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Ryan Flores</dc:creator>
      <dc:creator>Bakuei Matsukawa</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Web</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/ai-lovable-cover:Large?qlt=80"/>
    </item>
    <item>
      <title>What We Know About the NPM Supply Chain Attack</title>
      <description>Trend™ Research outlines the critical details behind the ongoing NPM supply chain attack and offers essential steps to stay protected against potential compromise. </description>
      <link>https://www.trendmicro.com/en_us/research/25/i/npm-supply-chain-attack.html</link>
      <pubDate>Thu, 18 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jeffrey Francis Bonaobra</name>
          <title>Sr. Threat Response Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Joshua Aquino</name>
          <title>Sr. Threat Response Engineer\Y Leader</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jeffrey Francis Bonaobra</dc:creator>
      <dc:creator>Joshua Aquino</dc:creator>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/NPM-thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>EvilAI Operators Use AI-Generated Code and Fake Apps for Far-Reaching Attacks </title>
      <description>Combining AI-generated code and social engineering, EvilAI operators are executing a rapidly expanding campaign, disguising their malware as legitimate applications to bypass security, steal credentials, and persistently compromise organizations worldwide.</description>
      <link>https://www.trendmicro.com/en_us/research/25/i/evilai.html</link>
      <pubDate>Thu, 11 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jeffrey Francis Bonaobra</name>
          <title>Sr. Threat Response Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Joshua Aquino</name>
          <title>Sr. Threat Response Engineer\Y Leader</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Emmanuel Panopio</name>
          <title>Sr. Threat Response Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Emmanuel Roll</name>
          <title>Sr. Threat Response Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Joshua Lijandro Tsang</name>
          <title>Sr. Cybersecurity Engineer\Y Leader</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Armando Nathaniel Pedragoza</name>
          <title>Sr. Threat Solution Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Melvin Singwa</name>
          <title>Sr. Threat Response Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Mohammed Malubay</name>
          <title>Sr. Cybersecurity Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Marco Dela Vega</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jeffrey Francis Bonaobra</dc:creator>
      <dc:creator>Joshua Aquino</dc:creator>
      <dc:creator>Emmanuel Panopio</dc:creator>
      <dc:creator>Emmanuel Roll</dc:creator>
      <dc:creator>Joshua Lijandro Tsang</dc:creator>
      <dc:creator>Armando Nathaniel Pedragoza</dc:creator>
      <dc:creator>Melvin Singwa</dc:creator>
      <dc:creator>Mohammed Malubay</dc:creator>
      <dc:creator>Marco Dela Vega</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/EvilAI-thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>What’s Your Cybersecurity Maturity?</title>
      <description>This blog post looks at four key milestones along the cybersecurity maturity journey and poses some questions you can ask to determine the stage of your organization’s progress.</description>
      <link>https://www.trendmicro.com/en_us/research/25/i/cybersecurity-maturity.html</link>
      <pubDate>Wed, 10 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Cyber Threats</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Data center</category>
      <category>Trend Micro Research : Network</category>
      <category>Trend Micro Research : Security Strategies</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/cybersecurity-maturity:Large?qlt=80"/>
    </item>
    <item>
      <title>Unmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed</title>
      <description>An analysis of the Gentlemen ransomware group, which employs advanced, adaptive tactics, techniques, and procedure to target critical industries worldwide.</description>
      <link>https://www.trendmicro.com/en_us/research/25/i/unmasking-the-gentlemen-ransomware.html</link>
      <pubDate>Tue, 9 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jacob Santos</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Maristel Policarpio</name>
          <title>Threat Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Don Ovid Ladores</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Junestherry Dela Cruz</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jacob Santos</dc:creator>
      <dc:creator>Maristel Policarpio</dc:creator>
      <dc:creator>Don Ovid Ladores</dc:creator>
      <dc:creator>Junestherry Dela Cruz</dc:creator>
      <trendmicro:primaryTag>Ransomware</trendmicro:primaryTag>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/gentlemen-cover:Large?qlt=80"/>
    </item>
    <item>
      <title>Three Critical Facts About Cyber Risk Management</title>
      <description>For CISOs responsible for cyber risk management, these three insights will help build a strong and reliable foundation for your proactive security strategy.</description>
      <link>https://www.trendmicro.com/en_us/research/25/i/cyber-risk-management-facts.html</link>
      <pubDate>Thu, 4 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors/>
      <trendmicro:primaryTag>Exploits &amp; Vulnerabilities</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Data center</category>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Security Strategies</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/cyber-risk-management-facts:Large?qlt=80"/>
    </item>
    <item>
      <title>An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via ‘Cracked’ Apps</title>
      <description>Trend™ Research analyzed a campaign distributing Atomic macOS Stealer (AMOS), a malware family targeting macOS users. Attackers disguise the malware as “cracked” versions of legitimate apps, luring users into installation. </description>
      <link>https://www.trendmicro.com/en_us/research/25/i/an-mdr-analysis-of-the-amos-stealer-campaign.html</link>
      <pubDate>Thu, 4 Sep 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Buddy Tancio</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Aldrin Ceriola</name>
          <title>Incident Response Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Khristoffer Jocson</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Nusrath Iqra</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Faith Higgins</name>
          <title>Sr. Security Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Buddy Tancio</dc:creator>
      <dc:creator>Aldrin Ceriola</dc:creator>
      <dc:creator>Khristoffer Jocson</dc:creator>
      <dc:creator>Nusrath Iqra</dc:creator>
      <dc:creator>Faith Higgins</dc:creator>
      <trendmicro:primaryTag>Malware</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Investigations</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/MacOSAMOS-thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title> Operation Serengeti 2.0: Trend Micro Helps Law Enforcement Fight Cybercrime in Africa</title>
      <description>Operation Serengeti 2.0: With Trend Micro’s support, INTERPOL led a major crackdown across Africa, arresting cybercriminals, dismantling infrastructures, recovering illicit funds, and protecting tens of thousands of victims.</description>
      <link>https://www.trendmicro.com/en_us/research/25/h/operation-serengeti-trend-micro.html</link>
      <pubDate>Fri, 29 Aug 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Trend Micro Research</name>
          <title>Trend Micro</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Trend Micro Research</dc:creator>
      <trendmicro:primaryTag>Cyber Crime</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/serengeti-cover:Large?qlt=80"/>
    </item>
    <item>
      <title>Trend Vision One™ Email Security Raises the Standard</title>
      <description>Stay ahead of evolving threats with AI-powered email and collaboration security.</description>
      <link>https://www.trendmicro.com/en_us/research/25/h/email-security-standards.html</link>
      <pubDate>Thu, 28 Aug 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Sara Atie</name>
          <title>Senior Product Manager</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Clement Perrin</name>
          <title>Technical Product Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Sara Atie</dc:creator>
      <dc:creator>Clement Perrin</dc:creator>
      <trendmicro:primaryTag>Phishing</trendmicro:primaryTag>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Spam</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/email-security-standards:Large?qlt=80"/>
    </item>
    <item>
      <title>TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents</title>
      <description>The TAOTH campaign exploited abandoned software and spear-phishing to deploy multiple malware families, targeting dissidents and other high-value individuals across Eastern Asia.</description>
      <link>https://www.trendmicro.com/en_us/research/25/h/taoth-campaign.html</link>
      <pubDate>Thu, 28 Aug 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Nick Dai</name>
          <title>Sr. Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Pierre Lee</name>
          <title>Sr. Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Nick Dai</dc:creator>
      <dc:creator>Pierre Lee</dc:creator>
      <trendmicro:primaryTag>APT &amp; Targeted Attacks</trendmicro:primaryTag>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/TAOTH-thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>Trend Vision One Integrates Microsoft Defender for Endpoint</title>
      <description>Discover how Trend Vision One integrates with Microsoft Defender for Endpoint to unify visibility, close security gaps, and accelerate risk mitigation - maximizing protection without replacing existing tools.</description>
      <link>https://www.trendmicro.com/en_us/research/25/h/vision-one-integrates-microsoft-defender.html</link>
      <pubDate>Tue, 26 Aug 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jenny Hua</name>
          <title>Product Marketing Manager, Ecosystem</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jenny Hua</dc:creator>
      <trendmicro:primaryTag>Compliance &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Network</category>
      <category>Trend Micro Research : Security Strategies</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/microsoft-defender-integrates-vision-one:Large?qlt=80"/>
    </item>
    <item>
      <title>Leadership, Innovation, and the Future of AI: Lessons from Trend Micro CEO &amp; Co-Founder Eva Chen</title>
      <description>Discover how AI is reshaping cybersecurity through our CEO, Eva Chen’s industry briefing series. Gain practical strategies, real-world insights, and a clear roadmap to secure your AI initiatives with confidence.</description>
      <link>https://www.trendmicro.com/en_us/research/25/h/eva-chen-future-of-ai.html</link>
      <pubDate>Fri, 22 Aug 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Ashley Savoie</name>
          <title>Director, Product Management</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Ashley Savoie</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Expert Perspective</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/eva-chen-future-of-ai:Large?qlt=80"/>
    </item>
    <item>
      <title>Warlock: From SharePoint Vulnerability Exploit to Enterprise Ransomware</title>
      <description>Warlock ransomware exploits unpatched Microsoft SharePoint vulnerabilities to gain access, escalate privileges, steal credentials, move laterally, and deploy ransomware with data exfiltration across enterprise environments.</description>
      <link>https://www.trendmicro.com/en_us/research/25/h/warlock-ransomware.html</link>
      <pubDate>Wed, 20 Aug 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jeffrey Francis Bonaobra</name>
          <title>Sr. Threat Response Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Joshua Aquino</name>
          <title>Sr. Threat Response Engineer\Y Leader</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Mohammed Malubay</name>
          <title>Sr. Cybersecurity Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>John Paul Lim</name>
          <title>Sr. Cybersecurity Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Emmanuel Panopio</name>
          <title>Sr. Threat Response Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Emmanuel Roll</name>
          <title>Sr. Threat Response Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Melvin Singwa</name>
          <title>Sr. Threat Response Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Carl Jayson Peliña</name>
          <title>Sr. Threat Solution Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Armando Nathaniel Pedragoza</name>
          <title>Sr. Threat Solution Engineer</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jeffrey Francis Bonaobra</dc:creator>
      <dc:creator>Joshua Aquino</dc:creator>
      <dc:creator>Mohammed Malubay</dc:creator>
      <dc:creator>John Paul Lim</dc:creator>
      <dc:creator>Emmanuel Panopio</dc:creator>
      <dc:creator>Emmanuel Roll</dc:creator>
      <dc:creator>Melvin Singwa</dc:creator>
      <dc:creator>Carl Jayson Peliña</dc:creator>
      <dc:creator>Armando Nathaniel Pedragoza</dc:creator>
      <trendmicro:primaryTag>Ransomware</trendmicro:primaryTag>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/Warlock-thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>Crypto24 Ransomware Group Blends Legitimate Tools with Custom Malware for Stealth Attacks</title>
      <description>Crypto24 is a ransomware group that stealthily blends legitimate tools with custom malware, using advanced evasion techniques to bypass security and EDR technologies.</description>
      <link>https://www.trendmicro.com/en_us/research/25/h/crypto24-ransomware-stealth-attacks.html</link>
      <pubDate>Thu, 14 Aug 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Maristel Policarpio</name>
          <title>Threat Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Sarah Pearl Camiling</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Don Ovid Ladores</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jacob Santos</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Andrei Alimboyao</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Lance Albert Mendoza</name>
          <title>Incident Response Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Krisford Macalalad</name>
          <title>Incident Response Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Maristel Policarpio</dc:creator>
      <dc:creator>Sarah Pearl Camiling</dc:creator>
      <dc:creator>Don Ovid Ladores</dc:creator>
      <dc:creator>Jacob Santos</dc:creator>
      <dc:creator>Andrei Alimboyao</dc:creator>
      <dc:creator>Lance Albert Mendoza</dc:creator>
      <dc:creator>Krisford Macalalad</dc:creator>
      <trendmicro:primaryTag>Ransomware</trendmicro:primaryTag>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/crypto24-cover:Large?qlt=80"/>
    </item>
    <item>
      <title>New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises</title>
      <description>We uncovered a campaign that makes use of Charon, a new ransomware family, and advanced APT-style techniques to target organizations with customized ransom demands.</description>
      <link>https://www.trendmicro.com/en_us/research/25/h/new-ransomware-charon.html</link>
      <pubDate>Tue, 12 Aug 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jacob Santos</name>
          <title>Senior Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Ted Lee</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Ahmed Kamal</name>
          <title>Sr. Incident Response Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Don Ovid Ladores</name>
          <title>Threats Analyst</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jacob Santos</dc:creator>
      <dc:creator>Ted Lee</dc:creator>
      <dc:creator>Ahmed Kamal</dc:creator>
      <dc:creator>Don Ovid Ladores</dc:creator>
      <trendmicro:primaryTag>Ransomware</trendmicro:primaryTag>
      <category>Trend Micro Research : Endpoints</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/Charon-thumbnail:Large?qlt=80"/>
    </item>
    <item>
      <title>Gunra Ransomware Group Unveils Efficient Linux Variant </title>
      <description>This blog discusses how Gunra ransomware’s new Linux variant accelerates and customizes encryption, expanding the group’s reach with advanced cross-platform tactics. </description>
      <link>https://www.trendmicro.com/en_us/research/25/g/gunra-ransomware-linux-variant.html</link>
      <pubDate>Tue, 29 Jul 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Jeffrey Francis Bonaobra</name>
          <title>Threat Research Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Melvin Singwa</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Emmanuel Panopio</name>
          <title>Threat Researcher</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Jeffrey Francis Bonaobra</dc:creator>
      <dc:creator>Melvin Singwa</dc:creator>
      <dc:creator>Emmanuel Panopio</dc:creator>
      <trendmicro:primaryTag>Ransomware</trendmicro:primaryTag>
      <category>Trend Micro Research : Latest News</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Research</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://www.trendmicro.com/content/dam/trendmicro/global/en/research/thumbnails/25/gunra_thumb.jpg"/>
    </item>
    <item>
      <title>Unlocking the Power of Amazon Security Lake for Proactive Security</title>
      <description>Security is a central challenge in modern application development and maintenance, requiring not just traditional practices but also a deep understanding of application architecture and data flow. While organizations now have access to rich data like logs and telemetry, the real challenge lies in translating this information into actionable insights. This article explores how leveraging those insights can help detect genuine security incidents and prevent their recurrence.</description>
      <link>https://www.trendmicro.com/en_us/research/25/g/amazon-security-lake-proactive-security.html</link>
      <pubDate>Mon, 28 Jul 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Felipe Costa</name>
          <title>Trend Micro</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Eduardo Golcman</name>
          <title>Trend Micro</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Fernando Cardoso</name>
          <title>VP Product Management</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Frank Shi</name>
          <title>Trend Micro</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Felipe Costa</dc:creator>
      <dc:creator>Eduardo Golcman</dc:creator>
      <dc:creator>Fernando Cardoso</dc:creator>
      <dc:creator>Frank Shi</dc:creator>
      <trendmicro:primaryTag>Privacy &amp; Risks</trendmicro:primaryTag>
      <category>Trend Micro Research : Cloud</category>
      <category>Trend Micro Research : Malware</category>
      <category>Trend Micro Research : How To</category>
      <category>Trend Micro Research : Phishing</category>
      <category>Trend Micro Research : Compliance &amp; Risks</category>
      <category>Trend Micro Research : Ransomware</category>
      <category>Trend Micro Research : Cyber Risk</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Cyber Crime</category>
      <category>Trend Micro Research : Exploits &amp; Vulnerabilities</category>
      <category>Trend Micro Research : Deep Web</category>
      <category>Trend Micro Research : Privacy &amp; Risks</category>
      <category>Trend Micro Research : Cyber Threats</category>
      <category>Trend Micro Research : Risk Management</category>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Spam</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/proactive-security:Large?qlt=80"/>
    </item>
    <item>
      <title>Revisiting UNC3886 Tactics to Defend Against Present Risk</title>
      <description>We examine the past tactics used by UNC3886 to gain insight on how to best strengthen defenses against the ongoing and emerging threats of this APT group.</description>
      <link>https://www.trendmicro.com/en_us/research/25/g/revisiting-unc3886-tactics-to-defend-against-present-risk.html</link>
      <pubDate>Mon, 28 Jul 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Cj Arsley Mateo</name>
          <title>Threat Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Ieriz Nicolle Gonzalez</name>
          <title>Threat Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Jacob Santos</name>
          <title>Threat Analyst</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Paul John Bardon</name>
          <title>Threat Hunter</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Angelo Junio</name>
          <title>Sr. Threat Solution Engineer</title>
        </trendmicro:author>
        <trendmicro:author>
          <name>Rayven Cervantes</name>
          <title>Sr. Threat Solution Engineer</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Cj Arsley Mateo</dc:creator>
      <dc:creator>Ieriz Nicolle Gonzalez</dc:creator>
      <dc:creator>Jacob Santos</dc:creator>
      <dc:creator>Paul John Bardon</dc:creator>
      <dc:creator>Angelo Junio</dc:creator>
      <dc:creator>Rayven Cervantes</dc:creator>
      <trendmicro:primaryTag>APT &amp; Targeted Attacks</trendmicro:primaryTag>
      <category>Trend Micro Research : APT &amp; Targeted Attacks</category>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/revisiting-unc3886-tactics-to-defend-against-present-risk:Large?qlt=80"/>
    </item>
    <item>
      <title>Proactive Email Security: The Power of AI</title>
      <description>Lead with AI-powered email security to stay ahead of attackers and personalize user interaction at every touchpoint, bridging technology and behavior with precision.</description>
      <link>https://www.trendmicro.com/en_us/research/25/g/proactive-email-security.html</link>
      <pubDate>Thu, 24 Jul 2025 00:00:00 +0000</pubDate>
      <trendmicro:authors>
        <trendmicro:author>
          <name>Sara Atie</name>
          <title>Senior Product Manager</title>
        </trendmicro:author>
      </trendmicro:authors>
      <dc:creator>Sara Atie</dc:creator>
      <trendmicro:primaryTag>Artificial Intelligence (AI)</trendmicro:primaryTag>
      <category>Trend Micro Research : Articles, News, Reports</category>
      <category>Trend Micro Research : Artificial Intelligence (AI)</category>
      <category>Trend Micro Research : Research</category>
      <enclosure length="0" type="image/jpeg" url="https://trendmicro.scene7.com/is/image/trendmicro/proactive-email-security:Large?qlt=80"/>
    </item>
  </channel>
</rss>