AI Pulse: Election Deepfakes, Disasters, Scams & more

Credit to Author: AI Team| Date: Thu, 31 Oct 2024 00:00:00 +0000

In the final weeks before November’s U.S. election, cybersecurity experts were calling October 2024 the “month of mischief”—a magnet for bad actors looking to disrupt the democratic process through AI-generated misinformation. This issue of AI Pulse looks at what can be done about deepfakes and other AI scams, and why defense-in-depth is the only way to go.

Read more

Attacker Abuses Victim Resources to Reap Rewards from Titan Network

Credit to Author: Ranga Duraisamy| Date: Wed, 30 Oct 2024 00:00:00 +0000

In this blog entry, we discuss how an attacker took advantage of the Atlassian Confluence vulnerability CVE-2023-22527 to connect servers to the Titan Network for cryptomining purposes.

Read more

Understanding the Initial Stages of Web Shell and VPN Threats: An MXDR Analysis

Credit to Author: Ryan Maglaque| Date: Thu, 24 Oct 2024 00:00:00 +0000

While cyberattacks that employ web shells and VPN compromise are not particularly novel, they are still prevalent. The recent incidents that Trend Micro MXDR analyzed highlight the importance of behavioral analysis and anomaly detection in security measures.

Read more

Unmasking Prometei: A Deep Dive Into Our MXDR Findings

Credit to Author: Buddy Tancio| Date: Wed, 23 Oct 2024 00:00:00 +0000

How does Prometei insidiously operate in a compromised system? This Managed Extended Detection and Response investigation conducted with the help of Trend Vision One provides a comprehensive analysis of the inner workings of this botnet so users can stop the threat in its tracks before it inflicts damage to the system.

Read more

Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach

Credit to Author: Abdelrahman Esmail| Date: Tue, 22 Oct 2024 00:00:00 +0000

In this blog entry, we discuss how malicious actors are exploiting Docker remote API servers via gRPC/h2c to deploy the cryptominer SRBMiner to facilitate their mining of XRP on Docker hosts.

Read more

How to Mitigate the Impact of Rogue AI Risks

Credit to Author: AI Team| Date: Thu, 17 Oct 2024 00:00:00 +0000

This is the latest blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights.

Read more

Silent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions

Credit to Author: Jacob Santos| Date: Tue, 15 Oct 2024 00:00:00 +0000

Trend Micro’s Threat Hunting Team discovered EDRSilencer, a red team tool that threat actors are attempting to abuse for its ability to block EDR traffic and conceal malicious activity.

Read more

Harnessing AI for Enhanced Security

Credit to Author: Fernando Cardoso| Date: Tue, 08 Oct 2024 00:00:00 +0000

A deep-dive into how AI-driven solutions from Trend Micro leveraging the NVIDIA AI Enterprise software platform are elevating security across critical industries

Read more

AI Pulse: What’s new in AI regulations?

Credit to Author: AI Team| Date: Mon, 30 Sep 2024 00:00:00 +0000

Fall is in the air and frameworks for mitigating AI risk are dropping like leaves onto policymakers’ desks. From California’s SB 1047 bill and NIST’s model-testing deal with OpenAI and Anthropic to REAIM’s blueprint for military AI governance, AI regulation is proving to be a hot and complicated topic.

Read more