At Trellix Advanced Threat Research (ATR), our goal is to identify and illuminate a broad spectrum of threats in today's complex landscape. ATR researchers are responsible for research in nearly every vertical of threat, including those targeting financial, retail, medical, industrial controls and many other industries. We have experts in vulnerability and threat research who find and report critical vulnerabilities in popular hardware and software and who use a global network of endpoints to track malware campaigns as well as the nation-states and malicious actors behind them.
Our red team incorporates and builds upon the techniques, tactics, and procedures (TTPs) uncovered by our researchers while performing engagements where the robustness of both our products and infrastructure are continuously being tested. And our Operational Intelligence team operates globally around the clock, keeping watch of the latest cyber campaigns and actively tracking the most impactful cyber threats. These findings are fed back into the solutions that ultimately power Trellix’s products.View the Tools & Techniques Library
Our Summer 2022 threat report details the evolution of Russian cybercrime, research into medical devices and access control systems.
A light-reading publication featuring the most impactful vulnerabilities every month
Welcome to the Bug Report, Heat Wave Edition! This month we have something special for you with CVE-2022-2107. But don’t worry, if that’s too hot for you to handle we also have two more vulnerabilities that cause headaches
This month’s bug report dives into two critical bugs targeting important business applications; CVE-2022-26134, CVE-2022-30190, CVE-2022-22980.
This month’s Bug Report highlights the importance of properly implemented and tested authentication by reviewing: CVE-2022-1388, CVE-2022-26925, and CVE-2022-22972.
Welcome back to the March 2022 Bug Report, for those that are unfamiliar, every month we compile a shortlist of the top vulnerabilities of the month.
Welcome back to the February 2022 Bug Report, for those that are unfamiliar, every month we compile a shortlist of the top vulnerabilities of the month.
New year, new bugs! And we don’t mean the creepy crawly type, but rather the vulnerabilities that exist across today’s security landscape you should be aware of. Keep reading to learn the latest and greatest so you can stay ahead of adversaries.
The Trellix Threat Labs Vulnerability Research team has found an unauthenticated remote code execution vulnerability, filed under CVE-2022-32548 affecting multiple DrayTek routers.Read More
Today Trellix Threat Labs is excited to announce the release of a whitepaper dedicated to 5G and its potential security concerns. As we look at the potential of 5G, we foresee it impacting nearly every facet of digital life in the developed world.Read More
In February 2016, news broke about what is now known as the ‘Bangladesh Bank Heist’. Hackers attempted to transfer nearly one billion USD through the SWIFT system towards recipients at other banks.Read More
The medical industry is at unique risk of attack due to the numerous purpose-built devices. Their lack of ubiquity creates a false sense of security and reduced scrutiny from the security research industry.Read More
We have frequently used code comparisons and visualizations but would it be possible to compare malware samples using a more abstract technique? What about sound?Read More
Vulnerabilities in an industrial control system used to grant physical access to privileged facilities and integrate with more building automation deployments.Read More