MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks

Credit to Author: Joseph C Chen| Date: Thu, 05 Dec 2024 00:00:00 +0000

Trend Micro’s monitoring of the MOONSHINE exploit kit revealed how it’s used by the threat actor Earth Minotaur to exploit Android messaging app vulnerabilities and install the DarkNimbus backdoor for surveillance.

Read more

AI Configuration Best Practices to address AI Security Risks

Credit to Author: Joy Ngaruro| Date: Mon, 02 Dec 2024 00:00:00 +0000

AI usage is on the rise as many companies are adopting AI for productivity gains and creation of new business opportunities which provide value to their customers.

Read more

AI Pulse: The Good from AI and the Promise of Agentic

Credit to Author: AI Team| Date: Sun, 01 Dec 2024 00:00:00 +0000

The perils of AI get a lot of airtime, but what are the upsides? This issue of AI Pulse looks at some of the good AI can bring, from strengthening cybersecurity to driving health breakthroughs—and how the coming wave of agentic AI is going to take those possibilities to a whole new level.

Read more

AI Pulse: Election Deepfakes, Disasters, Scams & more

Credit to Author: AI Team| Date: Thu, 31 Oct 2024 00:00:00 +0000

In the final weeks before November’s U.S. election, cybersecurity experts were calling October 2024 the “month of mischief”—a magnet for bad actors looking to disrupt the democratic process through AI-generated misinformation. This issue of AI Pulse looks at what can be done about deepfakes and other AI scams, and why defense-in-depth is the only way to go.

Read more

Understanding the Initial Stages of Web Shell and VPN Threats: An MXDR Analysis

Credit to Author: Ryan Maglaque| Date: Thu, 24 Oct 2024 00:00:00 +0000

While cyberattacks that employ web shells and VPN compromise are not particularly novel, they are still prevalent. The recent incidents that Trend Micro MXDR analyzed highlight the importance of behavioral analysis and anomaly detection in security measures.

Read more

Unmasking Prometei: A Deep Dive Into Our MXDR Findings

Credit to Author: Buddy Tancio| Date: Wed, 23 Oct 2024 00:00:00 +0000

How does Prometei insidiously operate in a compromised system? This Managed Extended Detection and Response investigation conducted with the help of Trend Vision One provides a comprehensive analysis of the inner workings of this botnet so users can stop the threat in its tracks before it inflicts damage to the system.

Read more

Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach

Credit to Author: Abdelrahman Esmail| Date: Tue, 22 Oct 2024 00:00:00 +0000

In this blog entry, we discuss how malicious actors are exploiting Docker remote API servers via gRPC/h2c to deploy the cryptominer SRBMiner to facilitate their mining of XRP on Docker hosts.

Read more