CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks

Credit to Author: Peter Girnus| Date: Tue, 04 Feb 2025 00:00:00 +0000

The ZDI team offers an analysis on how CVE-2025-0411, a zero-day vulnerability in 7-Zip, was actively exploited to target Ukrainian organizations in a SmokeLoader campaign involving homoglyph attacks.

Read more

Future of Cybersecurity: Will XDR Reshape SIEM & SOAR?

Credit to Author: Chris LaFleur| Date: Fri, 31 Jan 2025 00:00:00 +0000

XDR is reshaping cybersecurity by unifying and enhancing SIEM and SOAR capabilities into a single platform. It addresses alert fatigue, improves incident correlation, simplifies operations, and enhances efficiency for SOC teams.

Read more

Native Sensors vs. Integrations for XDR Platforms?

Credit to Author: Chris LaFleur| Date: Mon, 03 Feb 2025 00:00:00 +0000

Native sensors vs. integrations in XDR: Native sensors offer faster deployment, real-time detection, and deeper visibility, while integrations may add complexity and delays. Learn how to optimize your XDR strategy for improved security.

Read more

Future of Cybersecurity: Will XDR Absorb SIEM & SOAR?

Credit to Author: Chris LaFleur| Date: Fri, 31 Jan 2025 00:00:00 +0000

XDR is reshaping cybersecurity by unifying and enhancing SIEM and SOAR capabilities into a single platform. It addresses alert fatigue, improves incident correlation, simplifies operations, and enhances efficiency for SOC teams.

Read more

NDR: Not Just a “Nice to Have” Anymore

Credit to Author: Chris LaFleur| Date: Thu, 30 Jan 2025 00:00:00 +0000

Network Detection and Response (NDR) is no longer a ‘nice-to-have’—it’s essential. NDR complements EDR, accelerates incident response, and enhances visibility, making it a critical tool for modern cybersecurity strategies and service providers.

Read more

Lumma Stealer’s GitHub-Based Delivery Explored via Managed Detection and Response

Credit to Author: Buddy Tancio| Date: Thu, 30 Jan 2025 00:00:00 +0000

The Managed XDR team investigated a sophisticated campaign distributing Lumma Stealer through GitHub, where attackers leveraged the platform’s release infrastructure to deliver malware such as SectopRAT, Vidar, and Cobeacon.

Read more

ASRM: A New Pillar for Cyber Insurance Underwriting

Credit to Author: Chris LaFleur| Date: Wed, 29 Jan 2025 00:00:00 +0000

ASRM transforms cyber insurance underwriting by integrating real-time risk assessments, advanced tools (NDR, EDR, Cloud Security, MDR), and proactive mitigation strategies to improve accuracy, reduce claims, and build trust.

Read more

Invisible Prompt Injection: A Threat to AI Security

Credit to Author: Ian Ch Liu| Date: Wed, 22 Jan 2025 00:00:00 +0000

This article explains the invisible prompt injection, including how it works, an attack scenario, and how users can protect themselves.

Read more

Trend Micro™ Managed XDR Analysis of Infection From Fake Installers and Cracks

Credit to Author: Ryan Maglaque| Date: Fri, 10 Jan 2025 00:00:00 +0000

Our research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data.

Read more

Trend Micro Managed XDR Analysis of Infection From Fake Installers and Cracks

Credit to Author: Ryan Maglaque| Date: Fri, 10 Jan 2025 00:00:00 +0000

Our research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data.

Read more