The Trellix Advanced Research Center is the premier partner of security operations teams around the world. Across our research areas, our security analysts and researchers produce actionable real-time intelligence and threat indicators to help customers detect, respond and remediate the latest cybersecurity threats.
Our goal is to identify and illuminate a broad spectrum of threats in today's complex landscape through research in nearly every vertical of threat, including those targeting financial, retail, manufacturing, critical infrastructure medical, industrial controls and many other industries. Our Adversarial & Vulnerability Research Team looks to uncover and understand the latest adversarial activity across the globe along, how it impacts our daily lives and how solve for those threats. Skilled security researchers and analysts uncover and report hardware and software vulnerabilities to improve the security of products and services used globally. We deliver these insights and research ahead of the market and advise organizations around the world. The group behind these efforts are widely sought-after experts, supporting classified investigations, speaking at industry events, and educating influencers across media, academia, analysts and the public sector.View the Tools & Techniques Library
Our Summer 2022 report details the evolution of Russian cybercrime, research into medical devices and access control systems.
A light-reading publication featuring the most impactful vulnerabilities every month
Welcome back to the Bug Report: Spooky Edition, and we’ve got bugs crawling out of the walls! Appropriately, this month is rich with Spooky Scary Shelletons.
Welcome back to the Bug Report, don’t-stub-your-toe edition! With a couple of exceptions, September has been a very welcome slow month for major bugs.
Welcome to back to The Bug Report! Before we say goodbye to the last days of summer, let’s revisit some of the most striking bugs of August 2022.
This month’s bug report dives into two critical bugs targeting important business applications; CVE-2022-26134, CVE-2022-30190, CVE-2022-22980.
This month’s Bug Report highlights the importance of properly implemented and tested authentication by reviewing: CVE-2022-1388, CVE-2022-26925, and CVE-2022-22972.
This month’s bug report includes CVE-2022-21449, a critical flaw in Java’s ECDSA implementation; CVE-2022-21449, a fully-remote, pre-authentication vuln in MSRPC; and so much more.
Welcome back to the February 2022 Bug Report, for those that are unfamiliar, every month we compile a shortlist of the top vulnerabilities of the month.
New year, new bugs! And we don’t mean the creepy crawly type, but rather the vulnerabilities that exist across today’s security landscape you should be aware of. Keep reading to learn the latest and greatest so you can stay ahead of adversaries.
The Trellix Advanced Research team unauthenticated remote code execution vulnerability, filed under CVE-2022-32548 affecting multiple DrayTek routers.Read More
Trellix Advanced Research Center stumbled across a vulnerability in Python’s tarfile module. As we dug into the issue, we realized this was in fact CVE-2007-4559.Read More
Highlights on the rising threats of ransomware attacks and ransom payments, enabled by cryptocurrency. This blog outlines why this is a concerning trend and how Trellix helps organizations detect, respond to remediate threats to be better prepared.Read More
The medical industry is at unique risk of attack due to the numerous purpose-built devices. Their lack of ubiquity creates a false sense of security and reduced scrutiny from the security research industry.Read More
We have frequently used code comparisons and visualizations but would it be possible to compare malware samples using a more abstract technique? What about sound?Read More
Vulnerabilities in an industrial control system used to grant physical access to privileged facilities and integrate with more building automation deployments.Read More