Movatterモバイル変換


[0]ホーム

URL:


arrow_back
search
close

Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Threats
Environments
Article Type
Medium
CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin
Exploits & Vulnerabilities

CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin

Trend Research identified Russian threat actor Water Gamayun exploiting CVE-2025-26633, a zero-day vulnerability in the Microsoft Management Console that attackers exploit to execute malicious code and exfiltrate data.

March 25, 2025
APT & Targeted Attacks

The Espionage Toolkit of Earth Alux: A Closer Look at its Advanced Techniques

The cyberespionage techniques of Earth Alux, a China-linked APT group, are putting critical industries at risk. The attacks, aimed at the APAC and Latin American regions, leverage powerful tools and techniques to remain hidden while stealing sensitive data.

ResearchMar 31, 2025

Save to Folio

ResearchMar 31, 2025

Save to Folio

Exploits & Vulnerabilities

A Deep Dive into Water Gamayun’s Arsenal and Infrastructure

Trend Research discusses the delivery methods, custom payloads, and techniques used by Water Gamayun, the suspected Russian threat actor abusing a zero-day vulnerability in the Microsoft Management Console framework (CVE-2025-26633) to execute malicious code on infected machines.

ResearchMar 28, 2025

Save to Folio

ResearchMar 28, 2025

Save to Folio

Artificial Intelligence (AI)

Trend Cybertron: Full Platform or Open-Source?

Previously exclusive to Trend Vision One customers, select Trend Cybertron models, datasets and agents are now available via open-source. Build advanced security solutions and join us in developing the next generation of AI security technology.

Latest NewsMar 27, 2025

Save to Folio

Latest NewsMar 27, 2025

Save to Folio

Compliance & Risks

Trend Micro & IBM Team Up To Boost Mainframe Security

Trend Micro Deep Security adds security for mainframe enterprise integration

Latest NewsMar 27, 2025

Save to Folio

Latest NewsMar 27, 2025

Save to Folio

Exploits & Vulnerabilities

CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin

Trend Research identified Russian threat actor Water Gamayun exploiting CVE-2025-26633, a zero-day vulnerability in the Microsoft Management Console that attackers exploit to execute malicious code and exfiltrate data.

ResearchMar 25, 2025

Save to Folio

ResearchMar 25, 2025

Save to Folio

Ransomware

Albabat Ransomware Group Potentially Expands Targets to Multiple OS, Uses GitHub to Streamline Operations

Trend Research encounters new versions of the Albabat ransomware, which appears to target Windows, Linux, and macOS devices. We also reveal the group’s use of GitHub to streamline their ransomware operation.

ResearchMar 21, 2025

Save to Folio

ResearchMar 21, 2025

Save to Folio

Exploits & Vulnerabilities

ZDI-CAN-25373: Windows Shortcut Exploit Abused as Zero-Day in Widespread APT Campaigns

Trend Zero Day Initiative™ (ZDI) uncovered both state-sponsored and cybercriminal groups extensively exploiting ZDI-CAN-25373 (aka ZDI-25-148), a Windows .lnk file vulnerability that enables hidden command execution.

ResearchMar 18, 2025

Save to Folio

ResearchMar 18, 2025

Save to Folio

Malware

SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware

Trend Research analyzed SocGholish’s MaaS framework and its role in deploying RansomHub ransomware through compromised websites, using highly obfuscated JavaScript loaders to evade detection and execute various malicious tasks.

ResearchMar 14, 2025

Save to Folio

ResearchMar 14, 2025

Save to Folio

Cyber Threats

AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution

In this blog entry, we uncovered a campaign that uses fake GitHub repositories to distribute SmartLoader, which is then used to deliver Lumma Stealer and other malicious payloads. The campaign leverages GitHub’s trusted reputation to evade detection, using AI-generated content to make fake repositories appear legitimate.

ResearchMar 11, 2025

Save to Folio

ResearchMar 11, 2025

Save to Folio

Cyber Threats

From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario

Trend Micro™ Managed XDR assisted in an investigation of a B2B BEC attack that unveiled an entangled mesh weaved by the threat actor with the help of a compromised server, ensnaring three business partners in a scheme that spanned for days. This article features investigation insights, a proposed incident timeline, and recommended security practices.

ResearchMar 05, 2025

Save to Folio

ResearchMar 05, 2025

Save to Folio

No matches found

Country Headquarters

  • Trend Micro - United States (US)
  • 225 East John Carpenter Freeway
    Suite 1500
    Irving, Texas 75062
  • Phone:: +1 (817) 569-8900
Copyright ©2025 Trend Micro Incorporated. All rights reserved.
sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk

[8]ページ先頭

©2009-2025 Movatter.jp