Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
 Exploiting DeepSeek-R1: Breaking Down Chain of Thought Security
Cyber Risk

Exploiting DeepSeek-R1: Breaking Down Chain of Thought Security

This entry explores how the Chain of Thought reasoning in the DeepSeek-R1 AI model can be susceptible to prompt attacks, insecure output generation, and sensitive data theft.

March 04, 2025
Cyber Threats

From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario

Trend Micro™ Managed XDR assisted in an investigation of a B2B BEC attack that unveiled an entangled mesh weaved by the threat actor with the help of a compromised server, ensnaring three business partners in a scheme that spanned for days. This article features investigation insights, a proposed incident timeline, and recommended security practices.

Research Mar 05, 2025

Save to Folio

Research Mar 05, 2025

Save to Folio

Ransomware

Updated Shadowpad Malware Leads to Ransomware Deployment

In this blog entry, we discuss how Shadowpad is being used to deploy a new undetected ransomware family. Attackers deploy the malware by exploiting weak passwords and bypassing multi-factor authentication.

Research Feb 20, 2025

Save to Folio

Research Feb 20, 2025

Save to Folio

Malware

Chinese-Speaking Group Manipulates SEO with BadIIS

This blog post details our analysis of an SEO manipulation campaign targeting Asia. We also share recommendations that can help enterprises proactively secure their environment.

Research Feb 07, 2025

Save to Folio

Research Feb 07, 2025

Save to Folio

Endpoints

Native Sensors vs. Integrations for XDR Platforms?

Native sensors vs. integrations in XDR: Native sensors offer faster deployment, real-time detection, and deeper visibility, while integrations may add complexity and delays. Learn how to optimize your XDR strategy for improved security.

Expert Perspective Feb 03, 2025

Save to Folio

Expert Perspective Feb 03, 2025

Save to Folio

Compliance & Risks

Future of Cybersecurity: Will XDR Reshape SIEM & SOAR?

XDR is reshaping cybersecurity by unifying and enhancing SIEM and SOAR capabilities into a single platform. It addresses alert fatigue, improves incident correlation, simplifies operations, and enhances efficiency for SOC teams.

Expert Perspective Jan 31, 2025

Save to Folio

Expert Perspective Jan 31, 2025

Save to Folio

NDR: Not Just a "Nice to Have" Anymore

Network Detection and Response (NDR) is no longer a 'nice-to-have'—it’s essential. NDR complements EDR, accelerates incident response, and enhances visibility, making it a critical tool for modern cybersecurity strategies and service providers.

Expert Perspective Jan 30, 2025

Save to Folio

Expert Perspective Jan 30, 2025

Save to Folio