Future of Cybersecurity: Will XDR Reshape SIEM & SOAR?

Credit to Author: Chris LaFleur| Date: Fri, 31 Jan 2025 00:00:00 +0000

XDR is reshaping cybersecurity by unifying and enhancing SIEM and SOAR capabilities into a single platform. It addresses alert fatigue, improves incident correlation, simplifies operations, and enhances efficiency for SOC teams.

Read more

Future of Cybersecurity: Will XDR Absorb SIEM & SOAR?

Credit to Author: Chris LaFleur| Date: Fri, 31 Jan 2025 00:00:00 +0000

XDR is reshaping cybersecurity by unifying and enhancing SIEM and SOAR capabilities into a single platform. It addresses alert fatigue, improves incident correlation, simplifies operations, and enhances efficiency for SOC teams.

Read more

NDR: Not Just a “Nice to Have” Anymore

Credit to Author: Chris LaFleur| Date: Thu, 30 Jan 2025 00:00:00 +0000

Network Detection and Response (NDR) is no longer a ‘nice-to-have’—it’s essential. NDR complements EDR, accelerates incident response, and enhances visibility, making it a critical tool for modern cybersecurity strategies and service providers.

Read more

Lumma Stealer’s GitHub-Based Delivery Explored via Managed Detection and Response

Credit to Author: Buddy Tancio| Date: Thu, 30 Jan 2025 00:00:00 +0000

The Managed XDR team investigated a sophisticated campaign distributing Lumma Stealer through GitHub, where attackers leveraged the platform’s release infrastructure to deliver malware such as SectopRAT, Vidar, and Cobeacon.

Read more

ASRM: A New Pillar for Cyber Insurance Underwriting

Credit to Author: Chris LaFleur| Date: Wed, 29 Jan 2025 00:00:00 +0000

ASRM transforms cyber insurance underwriting by integrating real-time risk assessments, advanced tools (NDR, EDR, Cloud Security, MDR), and proactive mitigation strategies to improve accuracy, reduce claims, and build trust.

Read more

Invisible Prompt Injection: A Threat to AI Security

Credit to Author: Ian Ch Liu| Date: Wed, 22 Jan 2025 00:00:00 +0000

This article explains the invisible prompt injection, including how it works, an attack scenario, and how users can protect themselves.

Read more

IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024

Credit to Author: Trend Micro Research| Date: Fri, 17 Jan 2025 00:00:00 +0000

Since the end of 2024, we have been continuously monitoring large-scale DDoS attacks orchestrated by an IoT botnet exploiting vulnerable IoT devices such as wireless routers and IP cameras.

Read more

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit

Credit to Author: Sarah Pearl Camiling| Date: Thu, 09 Jan 2025 00:00:00 +0000

Our blog entry discusses a fake PoC exploit for LDAPNightmare (CVE-2024-49113) that is being used to distribute information-stealing malware.

Read more

Trend Micro Contributes and Maps Container Security to MITRE ATT&CK: A Game-Changer for Cyber Defense

Credit to Author: Bestin Koruthu| Date: Tue, 07 Jan 2025 00:00:00 +0000

Trend Micro leads the way by mapping its Container Security detection capabilities to the MITRE ATT&CK framework for Containers and contributing real-world attack data.

Read more

AI Pulse: Top AI Trends from 2024 – A Look Back

Credit to Author: AI Team| Date: Fri, 03 Jan 2025 00:00:00 +0000

In this edition of AI Pulse, let’s look back at top AI trends from 2024 in the rear view so we can more clearly predicts AI trends for 2025 and beyond.

Read more