Dark | Light
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

[@TrendMicroRSRCH](/creator/twitter/TrendMicroRSRCH)
"Fake CAPTCHA pages trick users into completing what looks like a routine security check but it redirects to phishing sites. Attackers leverage free easy-to-use web platforms to launch these scams. Trend Micros research offers practical tips to help you stay protected:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1973387426933420453) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-01T14:00Z 51.9K followers, XXX engagements


"CVE-2025-23298 demonstrates how a single poisoned model could trigger remote code execution in AI/ML workflows. Trend Micro ZDI team breaks down the attack surface and real-world consequences of this NVIDIA Merlin flaw:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1973613917952725139) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-02T05:00Z 51.9K followers, XXX engagements


"The Trend Micro Zero Day Initiative uncovered CVE-2025-23298 in NVIDIA Merlin. This critical flaw could allow attackers to gain root-level access steal training data and poison AI models. Discover the real-world impact of this vulnerability in our full analysis:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1973915908935409943) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-03T01:00Z 51.9K followers, XXX engagements


"1/5: LATEST NEWS: Trend Research has identified an active campaign spreading via WhatsApp through a malicious ZIP attachment. The malware campaign named SORVEPOTEL establishes persistence and hijacks the victims account to send itself to all of the victim's contacts"  
[X Link](https://x.com/TrendMicroRSRCH/status/1973986479278784603) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-03T05:40Z 51.9K followers, XXX engagements


"A flaw in NVIDIA Merlin highlights how model checkpoint loading can lead to remote code execution. CVE-2025-23298 is patched but ML pipelines must be hardened against unsafe inputs. Read our discovery:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1974488006762402255) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-04T14:53Z 51.9K followers, XXX engagements


"Trend Research shows attackers used phishing to gain privileged access to trusted Node Package Manager accounts injecting malicious code into widely adopted packages. Read our recommendations:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1974519886991765821) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-04T17:00Z 51.9K followers, XXX engagements


"Over XX% of SORVEPOTEL infections affect Brazils government and manufacturing sectors resulting in mass account bans due to spam-like activity. Review platform logs for automation and restrict file sharing on business messaging apps. Learn more:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1975244661481431358) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-06T17:00Z 51.9K followers, XXX engagements


"Hardcoded credentials in Wondershare RepairIt have left private user data and sensitive company information vulnerable to attacks. Our latest research explains how this happened and what you can do to protect your data and systems:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1975305062227276076) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-06T21:00Z 51.9K followers, XXX engagements


"A flaw in NVIDIA Merlin shows how model checkpoint loading can escalate into remote code execution. CVE-2025-23298 is patched but ML pipelines must be hardened against unsafe inputs. Read our discovery:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1975365461286998464) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-07T01:00Z 51.9K followers, XXX engagements


"MCP containers lack default security and neglecting privilege-dropping can leave systems vulnerable to escalation. Read our latest research to learn more about securing your enterprises MCP infrastructure:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1975425858476151131) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-07T05:00Z 51.9K followers, XXX engagements


"Mark Hoult of DataBank shares how expert threat intelligence from Trend Micro and CISA helped cut through media noise surrounding the recent SharePoint vulnerability. Here is his perspective:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1975456055044755704) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-07T07:00Z 51.9K followers, XXX engagements


"Automation saves time but can also save adversaries from exposure if their malicious flows go undetected. Trend Micros analysis explains the visibility gaps and how to plug them. Proactively secure your systems:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1975561751849496861) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-07T14:00Z 51.9K followers, XXX engagements


"The SORVEPOTEL malware campaign is exploiting WhatsApp Web sessions to spread malicious ZIP files affecting Brazils public and private sectors. Review your organizations policies on desktop messaging and file sharing. Learn more about its infection chain here:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1975667450692678082) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-07T21:00Z 51.9K followers, XXX engagements


"Wondershare RepairIt an AI app embedded cloud credentials in its code exposing user photos and internal assets. Attackers could manipulate files or deliver malicious updates via trusted channels. Learn more:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1975727848057942141) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-08T01:00Z 51.9K followers, XXX engagements


"1/6 Oracle has released an emergency patch for CVE-2025-61882 a critical pre-authentication remote code execution vulnerability in E-Business Suite. Active exploitation has been observed demanding immediate action"  
[X Link](https://x.com/TrendMicroRSRCH/status/1975783416491594161) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-08T04:40Z 51.9K followers, XXX engagements


"2/6 This multi-stage exploit chain leverages unauthenticated access and multiple weaknesses. With a CVSS score of XXX the risk is substantial for affected sectors"  
[X Link](https://x.com/TrendMicroRSRCH/status/1975783419058475367) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-08T04:40Z 51.9K followers, XX engagements


"3/6 Trend Micro has rolled out proactive rules filters and investigation tools to help organizations defend against exploitation attempts and assess exposure following attacks"  
[X Link](https://x.com/TrendMicroRSRCH/status/1975783420853678576) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-08T04:40Z 51.9K followers, XX engagements


"4/6 Trend Vision One provides actionable threat intelligence and curated search queries to help security teams detect respond and contain threats associated with this vulnerability"  
[X Link](https://x.com/TrendMicroRSRCH/status/1975783422464332088) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-08T04:40Z 51.9K followers, XX engagements


"5/6 We strongly advise applying Oracles official patch and supplementing with Trend Micros endpoint and network protections. Layered defense is key to minimizing risk"  
[X Link](https://x.com/TrendMicroRSRCH/status/1975783424276189496) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-08T04:40Z 51.9K followers, XXX engagements


"CVE-2025-23298 demonstrates how a single poisoned model could trigger remote code execution in AI/ML workflows. Trend Micro ZDI team breaks down the attack surface and real-world consequences of this NVIDIA Merlin flaw:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1975788244282314770) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-08T05:00Z 51.9K followers, XXX engagements


"Read-only controls in MCP servers are often incomplete and can expose sensitive data if bypassed. Our research explains how these weaknesses arise and shows how strict tokens least privilege and container security protect your AI supply chain:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1975818445808652612) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-08T07:00Z 51.9K followers, XXX engagements


"SORVEPOTEL malware is spreading via WhatsApp Web by sending unsolicited ZIP files to contacts. Opening these files on a desktop triggers automatic propagation to more users. Learn how to defend against this attack:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1976090235059503491) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-09T01:00Z 51.9K followers, XXX engagements


"By embedding cloud credentials in its code AI app Wondershare RepairIt left user photos and internal assets exposed despite privacy policy claims. Attackers could exploit this to manipulate files or distribute malicious updates through legitimate channels. Find out how to defend against such threats:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1976150634467369454) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-09T05:00Z 51.9K followers, XXX engagements


"Poor credential management in popular image and video repair software Wondershare RepairIt has exposed years of user data. Learn what this means for your privacy and how to keep your information secure:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1976452640167931971) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-10T01:00Z 51.9K followers, XXX engagements


"SORVEPOTEL is a self-propagating malware that hijacks WhatsApp Web sessions sending infected ZIP files to all contacts. Opening the ZIP on a desktop enables rapid spread leading to account bans and potential network compromise. Learn more:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1976513021959663914) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-10T05:00Z 51.9K followers, XXX engagements


"File formats distributed via trusted cloud channels can become potent attack vectors if credentials leak. Trend Vision One Code Security helps detect exposed credentials in CI/CD pipelines. See best practices to secure your supply chain:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1976513022051934664) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-10T05:00Z 51.9K followers, XXX engagements


"Wondershare RepairIt a popular AI-powered image and video repair app put sensitive user photos at risk by embedding overly permissive cloud access tokens in its code. This security lapse also exposed company AI models software and source code contradicting privacy assurances. Learn how to protect your data and what organizations should do differently:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1976543220348719534) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-10T07:00Z 51.9K followers, XXX engagements


"The SORVEPOTEL malware campaign is exploiting WhatsApp Web sessions to spread malicious ZIP files affecting Brazils public and private sectors. Review your organizations policies on desktop messaging and file sharing. Read:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1976905607190851648) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-11T07:00Z 51.9K followers, XXX engagements


"Agentic edge AI brings real-time autonomy to wearables robotics and security systemsbut advanced attacks that result in IP theft and operational disruption demand robust security. Trend Micro details key threats and mitigation strategies in our full research:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1977600183216075217) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-13T05:00Z 51.9K followers, XXX engagements


"Protecting agentic edge AI isnt just about software. Its about securing the entire system from sensors to cloud connections. See Trend Micros comprehensive strategies in our latest research. More about its multi-layered approach:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1977625500702106062) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-13T06:40Z 51.9K followers, XXX engagements


"Threat actors are rapidly exploiting new vulnerabilities increasing risk for organizations with internet-exposed devices. The shrinking window between disclosure and exploitation highlights the need for strong network segmentation and asset oversight. Full analysis:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1977630381324014063) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-13T07:00Z 51.9K followers, XXX engagements


"When software contains embedded credentials attackers can target the supply chain and manipulate distributed updates. We detail the risks and offer guidance for organizations to secure their software:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1977660583563477140) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-13T09:00Z 51.9K followers, XXX engagements


"Overly permissive SAS tokens amplify risk and even trusted vendors can inadvertently expose secrets. Regularly restrict cloud access and audit distribution mechanisms continuous assessment is essential for secure plugin development. Read our insights:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1977690779381346705) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-13T11:00Z 51.9K followers, XXX engagements


"The LockBit XXX ransomware targets Windows Linux and ESXi endpoints and servers increasing risk across multiple platforms. Strengthen defenses with layered protection cross-platform visibility EDR and log correlation. Explore our threat hunting guidance:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1977736078384668694) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-13T14:00Z 51.9K followers, XXX engagements


"Poor credential management in popular image and video repair software Wondershare RepairIt has exposed years of user data. Learn what this means for your privacy and how to keep your information secure:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1977781378428149918) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-13T17:00Z 51.9K followers, XXX engagements


"EvilAI exfiltrates browser data and maintains encrypted command-and-control comms making visibility and response critical. Find out how Trend Vision One helps mitigate this threat:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1977841776007254433) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-13T21:00Z 51.9K followers, XXX engagements


"RondoDox exploits Pwn2Own-discovered flaws in routers DVRs and more now with loader-as-a-service & Mirai/Morte payloads making detection harder. Patch and monitor your devices. Learn how to boost your defenses:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1977902175989748093) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-14T01:00Z 51.9K followers, XXX engagements


"File formats distributed via trusted cloud channels can become potent attack vectors if credentials leak. Trend Vision One Code Security helps detect exposed credentials in CI/CD pipelines. See best practices to secure your supply chain:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1977962570892947491) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-14T05:00Z 51.9K followers, XXX engagements


"Data and model poisoning threaten #AI integrity. Our proactive security roadmap includes advanced detection to keep your LLMs resilient and trustworthy. Get actionable tips in our latest research:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980204846138425742) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-20T09:30Z 51.9K followers, XXX engagements


"Trend Research exposes how attackers use SNMP and Telnet exploits to compromise Cisco switches and deploy rootkits. See how Trend Vision One enables proactive defense:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1978506155048550559) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-15T17:00Z 51.9K followers, 3885 engagements


"Threat actors are rapidly exploiting new vulnerabilities increasing risk for organizations with internet-exposed devices. The shrinking window between disclosure and exploitation highlights the need for strong network segmentation and asset oversight. Full analysis:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980562202466623760) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-21T09:10Z 51.9K followers, XXX engagements


"A targeted exposure campaign and compromised Telegram accounts led to a sharp decline in Lumma Stealer (Water Kurita) activity driving customers to rival MaaS platforms like Vidar and StealC. Read our full research on the evolving infostealer landscape:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980680482028204036) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-21T17:00Z 51.9K followers, XXX engagements


"Trend Research reveals a targeted campaign utilizing SNMP and Telnet exploits against some Cisco switches allowing attackers to deploy persistent rootkits. Discover how Trend Vision One delivers centralized risk management and proactive defense for your enterprise:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980167097486324191) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-20T07:00Z 51.9K followers, XXX engagements


"Resource abuse is a growing concern in #LLM deployments. Trend Vision One employs rate limiting and throttling to prevent denial of service and economic losses. Implement smarter defenses:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980537035401167188) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-21T07:30Z 51.9K followers, XXX engagements


"Overly permissive SAS tokens amplify risk and even trusted vendors can inadvertently expose secrets. Regularly restrict cloud access and audit distribution mechanisms continuous assessment is essential for secure plugin development. Read our insights:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980589884801700303) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-21T11:00Z 51.9K followers, XXX engagements


"Hardcoded credentials in Wondershare RepairIt have left private user data and sensitive company information vulnerable to attacks. Our latest research explains how this happened and what you can do to protect your data and systems:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980635182777381256) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-21T14:00Z 51.9K followers, XXX engagements


"The spike in task scam reports to the FTC suggest that cybercriminals are getting big payouts from these scams. Attackers are using initial small payouts and escalating deposit requests. Learn what a task scam is the modus operandi and how you can safeguard yourself from this threat:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980801276335046667) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-22T01:00Z 51.9K followers, XXX engagements


"1/8 Trend Micros latest analysis found that the Chaos ransomware campaign is leveraging advanced anti-EDR techniques. Our telemetry confirms malicious DLL sideloading and kernel-level driver deployment enabling broad defense evasion"  
[X Link](https://x.com/TrendMicroRSRCH/status/1972949541633528089) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-09-30T09:00Z 51.9K followers, 1007 engagements


"Operation Zero Disco shows why patching network hardware is vital. Trend Micro detects and neutralizes these advanced exploits while Trend Vision One with CNAPP secures your cloud workloads and containers without sacrificing performance. Learn more:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980290086122991641) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-20T15:08Z 51.9K followers, XXX engagements


"The future of autonomous devices depends on strong security. This report from Trend Research reveals how to defend against attacks and ensure your technology works safely and reliably. Read more:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980520415060505016) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-21T06:23Z 51.9K followers, XXX engagements


"The SORVEPOTEL malware campaign is exploiting WhatsApp Web sessions to spread malicious ZIP files affecting Brazils public and private sectors. Review your organizations policies on desktop messaging and file sharing. Read:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980891876124156369) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-22T07:00Z 51.9K followers, XXX engagements

[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@TrendMicroRSRCH "Fake CAPTCHA pages trick users into completing what looks like a routine security check but it redirects to phishing sites. Attackers leverage free easy-to-use web platforms to launch these scams. Trend Micros research offers practical tips to help you stay protected:"
X Link @TrendMicroRSRCH 2025-10-01T14:00Z 51.9K followers, XXX engagements

"CVE-2025-23298 demonstrates how a single poisoned model could trigger remote code execution in AI/ML workflows. Trend Micro ZDI team breaks down the attack surface and real-world consequences of this NVIDIA Merlin flaw:"
X Link @TrendMicroRSRCH 2025-10-02T05:00Z 51.9K followers, XXX engagements

"The Trend Micro Zero Day Initiative uncovered CVE-2025-23298 in NVIDIA Merlin. This critical flaw could allow attackers to gain root-level access steal training data and poison AI models. Discover the real-world impact of this vulnerability in our full analysis:"
X Link @TrendMicroRSRCH 2025-10-03T01:00Z 51.9K followers, XXX engagements

"1/5: LATEST NEWS: Trend Research has identified an active campaign spreading via WhatsApp through a malicious ZIP attachment. The malware campaign named SORVEPOTEL establishes persistence and hijacks the victims account to send itself to all of the victim's contacts"
X Link @TrendMicroRSRCH 2025-10-03T05:40Z 51.9K followers, XXX engagements

"A flaw in NVIDIA Merlin highlights how model checkpoint loading can lead to remote code execution. CVE-2025-23298 is patched but ML pipelines must be hardened against unsafe inputs. Read our discovery:"
X Link @TrendMicroRSRCH 2025-10-04T14:53Z 51.9K followers, XXX engagements

"Trend Research shows attackers used phishing to gain privileged access to trusted Node Package Manager accounts injecting malicious code into widely adopted packages. Read our recommendations:"
X Link @TrendMicroRSRCH 2025-10-04T17:00Z 51.9K followers, XXX engagements

"Over XX% of SORVEPOTEL infections affect Brazils government and manufacturing sectors resulting in mass account bans due to spam-like activity. Review platform logs for automation and restrict file sharing on business messaging apps. Learn more:"
X Link @TrendMicroRSRCH 2025-10-06T17:00Z 51.9K followers, XXX engagements

"Hardcoded credentials in Wondershare RepairIt have left private user data and sensitive company information vulnerable to attacks. Our latest research explains how this happened and what you can do to protect your data and systems:"
X Link @TrendMicroRSRCH 2025-10-06T21:00Z 51.9K followers, XXX engagements

"A flaw in NVIDIA Merlin shows how model checkpoint loading can escalate into remote code execution. CVE-2025-23298 is patched but ML pipelines must be hardened against unsafe inputs. Read our discovery:"
X Link @TrendMicroRSRCH 2025-10-07T01:00Z 51.9K followers, XXX engagements

"MCP containers lack default security and neglecting privilege-dropping can leave systems vulnerable to escalation. Read our latest research to learn more about securing your enterprises MCP infrastructure:"
X Link @TrendMicroRSRCH 2025-10-07T05:00Z 51.9K followers, XXX engagements

"Mark Hoult of DataBank shares how expert threat intelligence from Trend Micro and CISA helped cut through media noise surrounding the recent SharePoint vulnerability. Here is his perspective:"
X Link @TrendMicroRSRCH 2025-10-07T07:00Z 51.9K followers, XXX engagements

"Automation saves time but can also save adversaries from exposure if their malicious flows go undetected. Trend Micros analysis explains the visibility gaps and how to plug them. Proactively secure your systems:"
X Link @TrendMicroRSRCH 2025-10-07T14:00Z 51.9K followers, XXX engagements

"The SORVEPOTEL malware campaign is exploiting WhatsApp Web sessions to spread malicious ZIP files affecting Brazils public and private sectors. Review your organizations policies on desktop messaging and file sharing. Learn more about its infection chain here:"
X Link @TrendMicroRSRCH 2025-10-07T21:00Z 51.9K followers, XXX engagements

"Wondershare RepairIt an AI app embedded cloud credentials in its code exposing user photos and internal assets. Attackers could manipulate files or deliver malicious updates via trusted channels. Learn more:"
X Link @TrendMicroRSRCH 2025-10-08T01:00Z 51.9K followers, XXX engagements

"1/6 Oracle has released an emergency patch for CVE-2025-61882 a critical pre-authentication remote code execution vulnerability in E-Business Suite. Active exploitation has been observed demanding immediate action"
X Link @TrendMicroRSRCH 2025-10-08T04:40Z 51.9K followers, XXX engagements

"2/6 This multi-stage exploit chain leverages unauthenticated access and multiple weaknesses. With a CVSS score of XXX the risk is substantial for affected sectors"
X Link @TrendMicroRSRCH 2025-10-08T04:40Z 51.9K followers, XX engagements

"3/6 Trend Micro has rolled out proactive rules filters and investigation tools to help organizations defend against exploitation attempts and assess exposure following attacks"
X Link @TrendMicroRSRCH 2025-10-08T04:40Z 51.9K followers, XX engagements

"4/6 Trend Vision One provides actionable threat intelligence and curated search queries to help security teams detect respond and contain threats associated with this vulnerability"
X Link @TrendMicroRSRCH 2025-10-08T04:40Z 51.9K followers, XX engagements

"5/6 We strongly advise applying Oracles official patch and supplementing with Trend Micros endpoint and network protections. Layered defense is key to minimizing risk"
X Link @TrendMicroRSRCH 2025-10-08T04:40Z 51.9K followers, XXX engagements

"CVE-2025-23298 demonstrates how a single poisoned model could trigger remote code execution in AI/ML workflows. Trend Micro ZDI team breaks down the attack surface and real-world consequences of this NVIDIA Merlin flaw:"
X Link @TrendMicroRSRCH 2025-10-08T05:00Z 51.9K followers, XXX engagements

"Read-only controls in MCP servers are often incomplete and can expose sensitive data if bypassed. Our research explains how these weaknesses arise and shows how strict tokens least privilege and container security protect your AI supply chain:"
X Link @TrendMicroRSRCH 2025-10-08T07:00Z 51.9K followers, XXX engagements

"SORVEPOTEL malware is spreading via WhatsApp Web by sending unsolicited ZIP files to contacts. Opening these files on a desktop triggers automatic propagation to more users. Learn how to defend against this attack:"
X Link @TrendMicroRSRCH 2025-10-09T01:00Z 51.9K followers, XXX engagements

"By embedding cloud credentials in its code AI app Wondershare RepairIt left user photos and internal assets exposed despite privacy policy claims. Attackers could exploit this to manipulate files or distribute malicious updates through legitimate channels. Find out how to defend against such threats:"
X Link @TrendMicroRSRCH 2025-10-09T05:00Z 51.9K followers, XXX engagements

"Poor credential management in popular image and video repair software Wondershare RepairIt has exposed years of user data. Learn what this means for your privacy and how to keep your information secure:"
X Link @TrendMicroRSRCH 2025-10-10T01:00Z 51.9K followers, XXX engagements

"SORVEPOTEL is a self-propagating malware that hijacks WhatsApp Web sessions sending infected ZIP files to all contacts. Opening the ZIP on a desktop enables rapid spread leading to account bans and potential network compromise. Learn more:"
X Link @TrendMicroRSRCH 2025-10-10T05:00Z 51.9K followers, XXX engagements

"File formats distributed via trusted cloud channels can become potent attack vectors if credentials leak. Trend Vision One Code Security helps detect exposed credentials in CI/CD pipelines. See best practices to secure your supply chain:"
X Link @TrendMicroRSRCH 2025-10-10T05:00Z 51.9K followers, XXX engagements

"Wondershare RepairIt a popular AI-powered image and video repair app put sensitive user photos at risk by embedding overly permissive cloud access tokens in its code. This security lapse also exposed company AI models software and source code contradicting privacy assurances. Learn how to protect your data and what organizations should do differently:"
X Link @TrendMicroRSRCH 2025-10-10T07:00Z 51.9K followers, XXX engagements

"The SORVEPOTEL malware campaign is exploiting WhatsApp Web sessions to spread malicious ZIP files affecting Brazils public and private sectors. Review your organizations policies on desktop messaging and file sharing. Read:"
X Link @TrendMicroRSRCH 2025-10-11T07:00Z 51.9K followers, XXX engagements

"Agentic edge AI brings real-time autonomy to wearables robotics and security systemsbut advanced attacks that result in IP theft and operational disruption demand robust security. Trend Micro details key threats and mitigation strategies in our full research:"
X Link @TrendMicroRSRCH 2025-10-13T05:00Z 51.9K followers, XXX engagements

"Protecting agentic edge AI isnt just about software. Its about securing the entire system from sensors to cloud connections. See Trend Micros comprehensive strategies in our latest research. More about its multi-layered approach:"
X Link @TrendMicroRSRCH 2025-10-13T06:40Z 51.9K followers, XXX engagements

"Threat actors are rapidly exploiting new vulnerabilities increasing risk for organizations with internet-exposed devices. The shrinking window between disclosure and exploitation highlights the need for strong network segmentation and asset oversight. Full analysis:"
X Link @TrendMicroRSRCH 2025-10-13T07:00Z 51.9K followers, XXX engagements

"When software contains embedded credentials attackers can target the supply chain and manipulate distributed updates. We detail the risks and offer guidance for organizations to secure their software:"
X Link @TrendMicroRSRCH 2025-10-13T09:00Z 51.9K followers, XXX engagements

"Overly permissive SAS tokens amplify risk and even trusted vendors can inadvertently expose secrets. Regularly restrict cloud access and audit distribution mechanisms continuous assessment is essential for secure plugin development. Read our insights:"
X Link @TrendMicroRSRCH 2025-10-13T11:00Z 51.9K followers, XXX engagements

"The LockBit XXX ransomware targets Windows Linux and ESXi endpoints and servers increasing risk across multiple platforms. Strengthen defenses with layered protection cross-platform visibility EDR and log correlation. Explore our threat hunting guidance:"
X Link @TrendMicroRSRCH 2025-10-13T14:00Z 51.9K followers, XXX engagements

"Poor credential management in popular image and video repair software Wondershare RepairIt has exposed years of user data. Learn what this means for your privacy and how to keep your information secure:"
X Link @TrendMicroRSRCH 2025-10-13T17:00Z 51.9K followers, XXX engagements

"EvilAI exfiltrates browser data and maintains encrypted command-and-control comms making visibility and response critical. Find out how Trend Vision One helps mitigate this threat:"
X Link @TrendMicroRSRCH 2025-10-13T21:00Z 51.9K followers, XXX engagements

"RondoDox exploits Pwn2Own-discovered flaws in routers DVRs and more now with loader-as-a-service & Mirai/Morte payloads making detection harder. Patch and monitor your devices. Learn how to boost your defenses:"
X Link @TrendMicroRSRCH 2025-10-14T01:00Z 51.9K followers, XXX engagements

"File formats distributed via trusted cloud channels can become potent attack vectors if credentials leak. Trend Vision One Code Security helps detect exposed credentials in CI/CD pipelines. See best practices to secure your supply chain:"
X Link @TrendMicroRSRCH 2025-10-14T05:00Z 51.9K followers, XXX engagements

"Data and model poisoning threaten #AI integrity. Our proactive security roadmap includes advanced detection to keep your LLMs resilient and trustworthy. Get actionable tips in our latest research:"
X Link @TrendMicroRSRCH 2025-10-20T09:30Z 51.9K followers, XXX engagements

"Trend Research exposes how attackers use SNMP and Telnet exploits to compromise Cisco switches and deploy rootkits. See how Trend Vision One enables proactive defense:"
X Link @TrendMicroRSRCH 2025-10-15T17:00Z 51.9K followers, 3885 engagements

"Threat actors are rapidly exploiting new vulnerabilities increasing risk for organizations with internet-exposed devices. The shrinking window between disclosure and exploitation highlights the need for strong network segmentation and asset oversight. Full analysis:"
X Link @TrendMicroRSRCH 2025-10-21T09:10Z 51.9K followers, XXX engagements

"A targeted exposure campaign and compromised Telegram accounts led to a sharp decline in Lumma Stealer (Water Kurita) activity driving customers to rival MaaS platforms like Vidar and StealC. Read our full research on the evolving infostealer landscape:"
X Link @TrendMicroRSRCH 2025-10-21T17:00Z 51.9K followers, XXX engagements

"Trend Research reveals a targeted campaign utilizing SNMP and Telnet exploits against some Cisco switches allowing attackers to deploy persistent rootkits. Discover how Trend Vision One delivers centralized risk management and proactive defense for your enterprise:"
X Link @TrendMicroRSRCH 2025-10-20T07:00Z 51.9K followers, XXX engagements

"Resource abuse is a growing concern in #LLM deployments. Trend Vision One employs rate limiting and throttling to prevent denial of service and economic losses. Implement smarter defenses:"
X Link @TrendMicroRSRCH 2025-10-21T07:30Z 51.9K followers, XXX engagements

"Overly permissive SAS tokens amplify risk and even trusted vendors can inadvertently expose secrets. Regularly restrict cloud access and audit distribution mechanisms continuous assessment is essential for secure plugin development. Read our insights:"
X Link @TrendMicroRSRCH 2025-10-21T11:00Z 51.9K followers, XXX engagements

"Hardcoded credentials in Wondershare RepairIt have left private user data and sensitive company information vulnerable to attacks. Our latest research explains how this happened and what you can do to protect your data and systems:"
X Link @TrendMicroRSRCH 2025-10-21T14:00Z 51.9K followers, XXX engagements

"The spike in task scam reports to the FTC suggest that cybercriminals are getting big payouts from these scams. Attackers are using initial small payouts and escalating deposit requests. Learn what a task scam is the modus operandi and how you can safeguard yourself from this threat:"
X Link @TrendMicroRSRCH 2025-10-22T01:00Z 51.9K followers, XXX engagements

"1/8 Trend Micros latest analysis found that the Chaos ransomware campaign is leveraging advanced anti-EDR techniques. Our telemetry confirms malicious DLL sideloading and kernel-level driver deployment enabling broad defense evasion"
X Link @TrendMicroRSRCH 2025-09-30T09:00Z 51.9K followers, 1007 engagements

"Operation Zero Disco shows why patching network hardware is vital. Trend Micro detects and neutralizes these advanced exploits while Trend Vision One with CNAPP secures your cloud workloads and containers without sacrificing performance. Learn more:"
X Link @TrendMicroRSRCH 2025-10-20T15:08Z 51.9K followers, XXX engagements

"The future of autonomous devices depends on strong security. This report from Trend Research reveals how to defend against attacks and ensure your technology works safely and reliably. Read more:"
X Link @TrendMicroRSRCH 2025-10-21T06:23Z 51.9K followers, XXX engagements

"The SORVEPOTEL malware campaign is exploiting WhatsApp Web sessions to spread malicious ZIP files affecting Brazils public and private sectors. Review your organizations policies on desktop messaging and file sharing. Read:"
X Link @TrendMicroRSRCH 2025-10-22T07:00Z 51.9K followers, XXX engagements

creator/twitter::11927342/posts
/creator/twitter::11927342/posts