โŒ

Reading view

There are new articles available, click to refresh the page.

From Misconfigured Spring Boot Actuator to SharePoint Exfiltration: How Stolen Credentials Bypass MFA

Not every cloud breach starts with malware or a zero-day. In this incident, attackers discovered an exposed Spring Boot Actuator endpoint, harvested credentials from leaked configuration data, then used the OAuth2 Resource Owner Password Credentials (ROPC) flow to authenticate without MFA.

An MDR Analysis of the AMOS Stealer Campaign Targeting macOS via โ€˜Crackedโ€™ Apps

Trendโ„ข Research analyzed a campaign distributing Atomic macOS Stealer (AMOS), a malware family targeting macOS users. Attackers disguise the malware as โ€œcrackedโ€ versions of legitimate apps, luring users into installation.

TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents

The TAOTH campaign exploited abandoned software and spear-phishing to deploy multiple malware families, targeting dissidents and other high-value individuals across Eastern Asia.

New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises

We uncovered a campaign that makes use of Charon, a new ransomware family, and advanced APT-style techniques to target organizations with customized ransom demands.

Back to Business: Lumma Stealer Returns with Stealthier Methods

Lumma Stealer has re-emerged shortly after its takedown. This time, the cybergroup behind this malware appears to be intent on employing more covert tactics while steadily expanding its reach. This article shares the latest methods used to propagate this threat.

Why Trend Micro Continues to be Named a CNAPP Leader

Trend Micro is recognized for our Cloud CNAPP capabilities and product strategyโ€”affirming our vision to deliver a cloud security solution that predicts, protects, and responds to threats across hybrid and multi-cloud environments.

Clone, Compile, Compromise: Water Curseโ€™s Open-Source Malware Trap on GitHub

The Trend Microโ„ข Managed Detection and Response team uncovered a threat campaign orchestrated by an active group, Water Curse. The threat actor exploits GitHub, one of the most trusted platforms for open-source software, as a delivery channel for weaponized repositories.

Earth Lamia Develops Custom Arsenal to Target Multiple Industries

Trendโ„ข Research has been tracking an active APT threat actor named Earth Lamia, targeting multiple industries in Brazil, India and Southeast Asia countries at least since 2023. The threat actor primarily exploits vulnerabilities in web applications to gain access to targeted organizations.

โŒ