Blogs
The latest cybersecurity trends, best practices, security vulnerabilities, and more
Research


Jul 23, 2025
Critical SharePoint Vulnerabilities Under Active Exploitation
On-premises Microsoft SharePoint servers are currently facing high-impact, ongoing threat activity due to a set of critical vulnerabilities, notably CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, and CVE-2025-53771.

Jul 21, 2025
Dark Web Roast - June 2025 Edition
At Trellix, we think it's important we don’t make cybercriminals seem larger than life or hero-worship them. This roast is about showing the human side of cybercrime and how they mess up, just like anyone else.

Jul 17, 2025
Detecting and Visualizing Lateral Movement Attacks with Trellix Helix Connect
This blog marks the third installment in our series on detecting and visualizing lateral movement attacks with Trellix Helix Connect.

Jul 15, 2025
Threat Analysis: SquidLoader - Still Swimming Under the Radar
A new wave of SquidLoader malware samples are actively targeting financial services institutions in Hong Kong. This sophisticated malware exhibits significant evasion capabilities, achieving near-zero detection rates on VirusTotal at the time of analysis.

Jul 08, 2025
The DoNot APT group, also identified by various security vendors as APT-C-35, Mint Tempest, Origami Elephant, SECTOR02, and Viceroy Tiger, has been active since at least 2016, and has been attributed by several vendors to have links to India.

Jul 01, 2025
Overall, the required time to analyze a binary goes down with this approach, as a lot of manual tasks have been automated. Being able to run these scripts headless allows you to integrate them into your workflow of choice, making the methodology as flexible as possible.

Jul 01, 2025
The Bug Report - June 2025 Edition
Stay cool this summer with June 2025’s top 4 CVEs: RCEs, NTLM exploits, router worms & a Google supply chain flaw. Read now to patch fast and stay safe.

Jun 30, 2025
The Democratization of Phishing: Popularity of PhaaS platforms on the rise
PhaaS platforms are democratizing sophisticated phishing attacks, making them cheaper, easier, and more effective for cybercriminals, with AI amplifying their scale.

Jun 24, 2025
OneClik: A ClickOnce-Based APT Campaign Targeting Energy, Oil and Gas Infrastructure
The Trellix Advanced Research Center has uncovered a sophisticated APT malware campaign, we’ve dubbed OneClik, specifically targeting the Energy, Oil and Gas sector through phishing attacks and the exploitation of Microsoft ClickOnce.

Jun 23, 2025
Understanding Iranian Capabilities and Hacktivist Activities
At Trellix, we’ve been closely tracking Iranian cyber operations for years. Our research has shown that Iran maintains a mature and diverse cyber capability, executed through a combination of government agencies, contractors, and loosely affiliated proxy groups. These actors are capable of a broad spectrum of operations—from espionage and wiper attacks to disruptive campaigns targeting critical infrastructure.
Recent News
-
Jun 17, 2025
Trellix Accelerates Organizational Cyber Resilience with Deepened AWS Integrations
-
Jun 10, 2025
Trellix Finds Threat Intelligence Gap Calls for Proactive Cybersecurity Strategy Implementation
-
May 12, 2025
CRN Recognizes Trellix Partner Program with 2025 Women of the Channel List
-
Apr 29, 2025
Trellix Details Surge in Cyber Activity Targeting United States, Telecom
-
Apr 29, 2025
Trellix Advances Intelligent Data Security to Combat Insider Threats and Enable Compliance
RECENT STORIES
Jul 23, 2025
Critical SharePoint Vulnerabilities Under Active Exploitation
Jul 22, 2025
Eradicate Deeply Embedded Threats with AI-powered Endpoint Forensics
Jul 21, 2025
Beyoncé's Next Album: How to Prevent a Data Leak
Jul 21, 2025
Dark Web Roast - June 2025 Edition
Jul 17, 2025
Reflecting on the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms: How Trellix defines the future of endpoint security in a hybrid world
More from Trellix
The
CyberThreat Report
April 2025
Get the latest
Stay up to date with the latest cybersecurity trends, best practices, security vulnerabilities, and so much more.
Zero spam. Unsubscribe at any time.