arrow_back
search
close

Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Threats
Environments
Article Type
Medium
CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin
Exploits & Vulnerabilities

CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin

Trend Research identified Russian threat actor Water Gamayun exploiting CVE-2025-26633, a zero-day vulnerability in the Microsoft Management Console that attackers exploit to execute malicious code and exfiltrate data.

March 25, 2025
APT & Targeted Attacks

The Espionage Toolkit of Earth Alux: A Closer Look at its Advanced Techniques

The cyberespionage techniques of Earth Alux, a China-linked APT group, are putting critical industries at risk. The attacks, aimed at the APAC and Latin American regions, leverage powerful tools and techniques to remain hidden while stealing sensitive data.

Research Mar 31, 2025

Save to Folio

Research Mar 31, 2025

Save to Folio

Exploits & Vulnerabilities

A Deep Dive into Water Gamayun’s Arsenal and Infrastructure

Trend Research discusses the delivery methods, custom payloads, and techniques used by Water Gamayun, the suspected Russian threat actor abusing a zero-day vulnerability in the Microsoft Management Console framework (CVE-2025-26633) to execute malicious code on infected machines.

Research Mar 28, 2025

Save to Folio

Research Mar 28, 2025

Save to Folio

Artificial Intelligence (AI)

Trend Cybertron: Full Platform or Open-Source?

Previously exclusive to Trend Vision One customers, select Trend Cybertron models, datasets and agents are now available via open-source. Build advanced security solutions and join us in developing the next generation of AI security technology.

Latest News Mar 27, 2025

Save to Folio

Latest News Mar 27, 2025

Save to Folio

Exploits & Vulnerabilities

CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin

Trend Research identified Russian threat actor Water Gamayun exploiting CVE-2025-26633, a zero-day vulnerability in the Microsoft Management Console that attackers exploit to execute malicious code and exfiltrate data.

Research Mar 25, 2025

Save to Folio

Research Mar 25, 2025

Save to Folio

Cyber Threats

AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution

In this blog entry, we uncovered a campaign that uses fake GitHub repositories to distribute SmartLoader, which is then used to deliver Lumma Stealer and other malicious payloads. The campaign leverages GitHub’s trusted reputation to evade detection, using AI-generated content to make fake repositories appear legitimate.

Research Mar 11, 2025

Save to Folio

Research Mar 11, 2025

Save to Folio

Cyber Threats

From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario

Trend MicroTM Managed XDR assisted in an investigation of a B2B BEC attack that unveiled an entangled mesh weaved by the threat actor with the help of a compromised server, ensnaring three business partners in a scheme that spanned for days. This article features investigation insights, a proposed incident timeline, and recommended security practices.

Research Mar 05, 2025

Save to Folio

Research Mar 05, 2025

Save to Folio

No matches found

Country Headquarters

  • Trend Micro - United States (US)
  • 225 East John Carpenter Freeway
    Suite 1500
    Irving, Texas 75062
  • Phone:: +1 (817) 569-8900
Copyright ©2025 Trend Micro Incorporated. All rights reserved.
sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk

AltStyle によって変換されたページ (->オリジナル) /