<?xml version="1.0" encoding="utf-8"?>
           <rss version="2.0">
                <channel>
                    <title>Trend Micro Latest Security News</title>
		    <link>https://www.trendmicro.com/vinfo/us/security/rss/securitynews</link>
                    <description>
                    Security News from Trend Micro provides the latest news and updates, insight and analysis, as well as advice on the latest threats, alerts, and security trends.
                    </description>
                    <language>en-us</language>
                    <copyright >Copyright 2026 Trend Micro Incorporated, All Rights Reserved</copyright >
                    <ttl>60</ttl>
                    <lastBuildDate>Sun, 19 Apr 2026 10:31:24 GMT</lastBuildDate>

        
            <item>
                <title>2025 APT Report: Staying Ahead of the Modern Threat Landscape</title>
		<guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/2025-apt-report-staying-ahead-of-the-modern-threat-landscape</guid>
                <link>https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/2025-apt-report-staying-ahead-of-the-modern-threat-landscape</link>
                <pubDate>Thu, 16 Apr 2026 07:00:00 GMT</pubDate>
                <description><![CDATA[<img src='https://documents.trendmicro.com/images/uploads/2025-APT-Report-banner-dCR4Mws.jpg' width='99' height='69' style='float:left; margin-right:5px;'> AI‑enabled APTs are accelerating attacks, shrinking response windows, and raising the stakes. This report reveals what’s changed and how to defend against it.]]></description>
     
        </item>
        
            <item>
                <title>Sockpuppeting: How a Single Line Can Bypass LLM Safety Guardrails</title>
		<guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/sockpuppeting-how-a-single-line-can-bypass-llm-safety-guardrails</guid>
                <link>https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/sockpuppeting-how-a-single-line-can-bypass-llm-safety-guardrails</link>
                <pubDate>Fri, 10 Apr 2026 07:00:00 GMT</pubDate>
                <description><![CDATA[<img src='https://documents.trendmicro.com/images/uploads/img-envato-sockpuppeting-Y5cUqiT.jpg' width='99' height='69' style='float:left; margin-right:5px;'> A jailbreak through sockpuppeting can be easily done as it requires no special tools nor optimization. It only takes a faulty prefill feature, and the gates are open.  We tested 11 LLM-powered assistants against sockpuppeting and found varying levels of robustness across today’s leading LLMs. ]]></description>
     
        </item>
        
            <item>
                <title>It’s By Design: The Use-After-Free of Azure Cloud</title>
		<guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/its-by-design-the-use-after-free-of-azure-cloud</guid>
                <link>https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/its-by-design-the-use-after-free-of-azure-cloud</link>
                <pubDate>Fri, 03 Apr 2026 07:00:00 GMT</pubDate>
                <description><![CDATA[<img src='https://documents.trendmicro.com/images/uploads/its-by-design-banner-UoC7kSQ.webp' width='99' height='69' style='float:left; margin-right:5px;'> Persistent DNS references to deleted Azure resources create opportunities for attackers to take over trusted endpoints, highlighting a critical risk in cloud infrastructure. TrendAI™ Research discusses six real-world scenarios where attackers could exploit lingering DNS names, allowing them to inherit trust and compromise dependent systems.]]></description>
     
        </item>
        
            <item>
                <title>Guarding LLMs With a Layered Prompt Injection Representation</title>
		<guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/security-technology/guarding-llms-with-a-layered-prompt-injection-representation</guid>
                <link>https://www.trendmicro.com/vinfo/us/security/news/security-technology/guarding-llms-with-a-layered-prompt-injection-representation</link>
                <pubDate>Tue, 31 Mar 2026 07:00:00 GMT</pubDate>
                <description><![CDATA[<img src='https://documents.trendmicro.com/images/uploads/guarding-llms-with-a-layered-prompt-injection-representation-th-6FR0yg5.jpg' width='99' height='69' style='float:left; margin-right:5px;'> TrendAI™ Research has developed a model training procedure for learning an essential representation of prompt injection attacks. The resulting prompt representation exhibits approximately linear separability, allowing the specialized, small-scale classifier trained on features derived from the representation to achieve high classification performance.]]></description>
     
        </item>
        
            <item>
                <title>From Anarchy to Authority: Closing the Governance Gap in Agentic AI</title>
		<guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/from-anarchy-to-authority-closing-the-governance-gap-in-agentic-ai</guid>
                <link>https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/from-anarchy-to-authority-closing-the-governance-gap-in-agentic-ai</link>
                <pubDate>Mon, 30 Mar 2026 07:00:00 GMT</pubDate>
                <description><![CDATA[<img src='https://documents.trendmicro.com/images/uploads/Governance-Gap-in-Agentic-AI-banner-byW1Uld.webp' width='99' height='69' style='float:left; margin-right:5px;'> Agentic AI marks a fundamental shift that enables autonomous action and decision-making across enterprise systems but also introduces new, complex risks. TrendAI™’s Agentic Governance Gateway empowers organizations to understand, control, and trust agentic AI, ensuring safety and confidence in this new frontier.]]></description>
     
        </item>
        
            <item>
                <title>Unconventional Attack Surfaces: Identity Replication via Employee Digital Twins</title>
		<guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/unconventional-attack-surfaces-identity-replication-via-employee-digital-twins</guid>
                <link>https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/unconventional-attack-surfaces-identity-replication-via-employee-digital-twins</link>
                <pubDate>Thu, 26 Mar 2026 07:00:00 GMT</pubDate>
                <description><![CDATA[<img src='https://documents.trendmicro.com/images/uploads/mj-employee-profile-DfrJkz7.webp' width='99' height='69' style='float:left; margin-right:5px;'> In this second installment of a series exploring emerging AI-driven attack surfaces, TrendAI™ Research focuses on employee digital twins: AI replicas of employees that create new vectors for identity compromise, data exfiltration, and persistent access.]]></description>
     
        </item>
        
            <item>
                <title>Old Vulnerabilities, New AI Era, Amplified Risk: How Outdated Flaws Continue to Fuel the N-Day Exploit Market</title>
		<guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/old-vulnerabilities-new-ai-era-amplified-risk-how-outdated-flaws-continue-to-fuel-the-n-day-exploit-market</guid>
                <link>https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/old-vulnerabilities-new-ai-era-amplified-risk-how-outdated-flaws-continue-to-fuel-the-n-day-exploit-market</link>
                <pubDate>Wed, 25 Mar 2026 07:00:00 GMT</pubDate>
                <description><![CDATA[<img src='https://documents.trendmicro.com/images/uploads/N-Day-banner-y1kVT4b.webp' width='99' height='69' style='float:left; margin-right:5px;'> Even as AI adoption accelerates, old exploits remain overlooked weaknesses. Underground trends show a renewed demand for exploits, with cybercriminals relying on aging but still effective vulnerabilities. We examine this blind spot and why long-standing issues need to be addressed. ]]></description>
     
        </item>
        
            <item>
                <title>Ransomware Spotlight: Agenda</title>
		<guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-agenda</guid>
                <link>https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-agenda</link>
                <pubDate>Wed, 18 Mar 2026 07:00:00 GMT</pubDate>
                <description><![CDATA[<img src='https://documents.trendmicro.com/images/uploads/RS-Agenda-banner-e0t3rAB.webp' width='99' height='69' style='float:left; margin-right:5px;'> Agenda has rapidly grown into one of the most prolific and dangerous ransomware operations, leveraging advanced techniques, cross-platform variants, and alliances with other major threat groups. Its aggressive double-extortion model and expanding victim base across critical industries make it a serious enterprise risk that demands proactive detection and defense.]]></description>
     
        </item>
        
            <item>
                <title>Cracking the Isolation: Novel Docker Desktop VM Escape Techniques Under WSL2</title>
		<guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/cracking-the-isolation-novel-docker-desktop-vm-escape-techniques-under-wsl2</guid>
                <link>https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/cracking-the-isolation-novel-docker-desktop-vm-escape-techniques-under-wsl2</link>
                <pubDate>Thu, 12 Mar 2026 07:00:00 GMT</pubDate>
                <description><![CDATA[<img src='https://documents.trendmicro.com/images/uploads/collaborative-process-of-multicultural-skilled-you-2026-01-07-05-50-10-utc%20copy-O5aZDTE.jpg' width='99' height='69' style='float:left; margin-right:5px;'> TrendAI™ Research has discovered several new methods that enable attackers to escape Docker Desktop’s WSL2 VM and run arbitrary code on the host. Our analysis highlights how trusted development tooling can create unexpected attack surfaces when internal APIs and configuration mechanisms are left exposed.]]></description>
     
        </item>
        
            <item>
                <title>Azure Control Plane Threat Detection With TrendAI Vision One™</title>
		<guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/azure-control-plane-threat-detection-with-trendai-vision-one</guid>
                <link>https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/azure-control-plane-threat-detection-with-trendai-vision-one</link>
                <pubDate>Tue, 10 Mar 2026 07:00:00 GMT</pubDate>
                <description><![CDATA[<img src='https://documents.trendmicro.com/images/uploads/azure-banner-qkDkd9Z.png' width='99' height='69' style='float:left; margin-right:5px;'> Malicious access to the Azure control plane can lead to a cascade of assaults that can be disastrous and difficult to detect. TrendAI Vision One™ helps protect the Azure control plane through early threat identification and rapid response.]]></description>
     
        </item>
        
            <item>
                <title>Forecasting Future Outbreaks: A Behavioral and Predictive Approach to Proactive Cyber Risk Management</title>
		<guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/forecasting-future-outbreaks-a-behavioral-and-predictive-approach-to-proactive-cyber-risk-management</guid>
                <link>https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/forecasting-future-outbreaks-a-behavioral-and-predictive-approach-to-proactive-cyber-risk-management</link>
                <pubDate>Thu, 05 Mar 2026 08:00:00 GMT</pubDate>
                <description><![CDATA[<img src='https://documents.trendmicro.com/images/uploads/Forecasting-future-outbreaks-banner-bEfCurV.jpeg' width='99' height='69' style='float:left; margin-right:5px;'> TrendAI™ Research has found that user behaviors and machine usage patterns are key drivers of malware risk. This study’s analysis of over 10 million endpoints confirms that risk is highly context-dependent and offers insights into how organizations can pivot to improve their security posture.]]></description>
     
        </item>
        
            <item>
                <title>Fault Lines in the AI Ecosystem: TrendAI™ State of AI Security Report</title>
		<guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/threat-landscape/fault-lines-in-the-ai-ecosystem-trendai-state-of-ai-security-report</guid>
                <link>https://www.trendmicro.com/vinfo/us/security/news/threat-landscape/fault-lines-in-the-ai-ecosystem-trendai-state-of-ai-security-report</link>
                <pubDate>Tue, 03 Mar 2026 08:00:00 GMT</pubDate>
                <description><![CDATA[<img src='https://documents.trendmicro.com/images/uploads/state-of-ai-2h-2025-EMLnmtK.jpg' width='99' height='69' style='float:left; margin-right:5px;'> AI systems were ground zero for cyber risk in the second half of 2025: Critical flaws were on the rise and adversaries targeted every layer of the AI stack. As underlying weaknesses across the ecosystem continue to widen, organizations must adopt a vigilant, AI-first approach to defense. ]]></description>
     
        </item>
        
            <item>
                <title>The Industrialization of Botnets: Automation and Scale as a New Threat Infrastructure</title>
		<guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/threat-landscape/the-industrialization-of-botnets-automation-and-scale-as-a-new-threat-infrastructure</guid>
                <link>https://www.trendmicro.com/vinfo/us/security/news/threat-landscape/the-industrialization-of-botnets-automation-and-scale-as-a-new-threat-infrastructure</link>
                <pubDate>Thu, 26 Feb 2026 08:00:00 GMT</pubDate>
                <description><![CDATA[<img src='https://documents.trendmicro.com/images/uploads/Industrialization-of-botnets-banner-1F8Qc5g.webp' width='99' height='69' style='float:left; margin-right:5px;'> Today’s botnet operations, enabled by automation and shared resources, are outpacing traditional response and patching models. This highlights the growing importance of security capabilities that can match the speed and scale of these attacks.]]></description>
     
        </item>
        
            <item>
                <title>From Holiday Snap to Custom Scam in 30 Minutes: How AI Turns Public Photos Into Targeted Attacks</title>
		<guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/from-holiday-snap-to-custom-scam-in-30-minutes-how-ai-turns-public-photos-into-targeted-attacks</guid>
                <link>https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/from-holiday-snap-to-custom-scam-in-30-minutes-how-ai-turns-public-photos-into-targeted-attacks</link>
                <pubDate>Tue, 24 Feb 2026 08:00:00 GMT</pubDate>
                <description><![CDATA[<img src='https://documents.trendmicro.com/images/uploads/tools-walkthrough-insta-banner-7oWgKOx.webp' width='99' height='69' style='float:left; margin-right:5px;'> AI now enables attackers to rapidly convert publicly shared personal images into scalable, highly targeted phishing intelligence, turning everyday online photos into a significant and often overlooked security risk for individuals and enterprises.]]></description>
     
        </item>
        
            <item>
                <title>From LinkedIn to Tailored Attack in 30 Minutes: How AI Accelerates Target Profiling for Cybercrime</title>
		<guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/from-linkedin-to-tailored-attack-in-30-minutes-how-ai-accelerates-target-profiling-for-cybercrime</guid>
                <link>https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/from-linkedin-to-tailored-attack-in-30-minutes-how-ai-accelerates-target-profiling-for-cybercrime</link>
                <pubDate>Mon, 23 Feb 2026 08:00:00 GMT</pubDate>
                <description><![CDATA[<img src='https://documents.trendmicro.com/images/uploads/tools-walkthrough-banner-G4zxCen.jpg' width='99' height='69' style='float:left; margin-right:5px;'> The industrialization of AI-driven OSINT has transformed individual digital footprints into machine-readable intelligence at scale, enabling attackers to operationalize personalized reconnaissance at volume.]]></description>
     
        </item>
        
            <item>
                <title>Threat Attribution Framework: How TrendAI™ Applies Structure Over Speculation</title>
		<guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/threat-attribution-framework-how-trendai-applies-structure-over-speculation</guid>
                <link>https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/threat-attribution-framework-how-trendai-applies-structure-over-speculation</link>
                <pubDate>Thu, 12 Feb 2026 08:00:00 GMT</pubDate>
                <description><![CDATA[<img src='https://documents.trendmicro.com/images/uploads/trendai-attribution-framework-banner-w4L0ns9.webp' width='99' height='69' style='float:left; margin-right:5px;'> TrendAI™ brings structure and discipline to threat attribution, helping security leaders and teams make informed decisions about cyber risk, incident response, and overall defensive posture.]]></description>
     
        </item>
        
            <item>
                <title>AI Skills as an Emerging Attack Surface in Critical Sectors: Enhanced Capabilities, New Risks</title>
		<guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ai-skills-as-an-emerging-attack-surface-in-critical-sectors-enhanced-capabilities-new-risks</guid>
                <link>https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ai-skills-as-an-emerging-attack-surface-in-critical-sectors-enhanced-capabilities-new-risks</link>
                <pubDate>Tue, 10 Feb 2026 08:00:00 GMT</pubDate>
                <description><![CDATA[<img src='https://documents.trendmicro.com/images/uploads/AI-skill-banner-800-ZIzPJ4y.webp' width='99' height='69' style='float:left; margin-right:5px;'> AI skills bridge the gap between AI capabilities and real-world operations, but in doing so, they also introduce new risks and avenues for attack. We explore the challenges of AI skill adoption and provide a practical framework for secure deployment.]]></description>
     
        </item>
        
            <item>
                <title>An Update on the State of Criminal AI: Crime as a Service, AI as the Multiplier</title>
		<guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/the-state-of-criminal-ai</guid>
                <link>https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/the-state-of-criminal-ai</link>
                <pubDate>Wed, 28 Jan 2026 08:00:00 GMT</pubDate>
                <description><![CDATA[<img src='https://documents.trendmicro.com/images/uploads/an-update-on-the-state-of-criminal-ai-bq64jel.jpg' width='99' height='69' style='float:left; margin-right:5px;'> The 2025 criminal AI battlefield underscores the robust weaponization of the rapidly growing technology. From criminal large language models (LLMs) and AI-powered malware to deepfakes at scale, threats are advancing on every front. Looking back on the year in criminal AI is crucial for hardening defenses and preparing for what’s next.]]></description>
     
        </item>
        
            <item>
                <title>How Unmanaged AI Adoption Puts Your Enterprise at Risk</title>
		<guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/how-unmanaged-ai-adoption-puts-enterprises-at-risk</guid>
                <link>https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/how-unmanaged-ai-adoption-puts-enterprises-at-risk</link>
                <pubDate>Wed, 21 Jan 2026 08:00:00 GMT</pubDate>
                <description><![CDATA[<img src='https://documents.trendmicro.com/images/uploads/Criminal_Ai_in_2025_banner-Rw5wv1x.png' width='99' height='69' style='float:left; margin-right:5px;'> We challenge assumptions about AI models by revealing real-world biases and limitations, and the impact of poorly managed AI adoptions.]]></description>
     
        </item>
        
            <item>
                <title>Estimating Future Risk Outbreaks at Scale in Real-World Deployments</title>
		<guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/estimating-future-risk-outbreaks-at-scale-in-real-world-deployments</guid>
                <link>https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/estimating-future-risk-outbreaks-at-scale-in-real-world-deployments</link>
                <pubDate>Tue, 16 Dec 2025 08:00:00 GMT</pubDate>
                <description><![CDATA[<img src='https://documents.trendmicro.com/images/uploads/estimating-future-risk-outbreaks-at-scale-in-real-world-deployments-5KivtSk.jpg' width='99' height='69' style='float:left; margin-right:5px;'> Trend™ Research introduces a novel system that leverages AI and behavioral analytics to proactively estimate the risk of future malware outbreaks based on users’ behavior to help organizations strategically strengthen their defenses.]]></description>
     
        </item>
        
                </channel>
            </rss>  
        