At Trellix Advanced Threat Research (ATR), our goal is to identify and illuminate a broad spectrum of threats in today's complex landscape. ATR researchers are responsible for research in nearly every vertical of threat, including those targeting financial, retail, medical, industrial controls and many other industries. We have experts in vulnerability and threat research who find and report critical vulnerabilities in popular hardware and software and who use a global network of endpoints to track malware campaigns as well as the nation-states and malicious actors behind them.
Our red team incorporates and builds upon the techniques, tactics, and procedures (TTPs) uncovered by our researchers while performing engagements where the robustness of both our products and infrastructure are continuously being tested. And our Operational Intelligence team operates globally around the clock, keeping watch of the latest cyber campaigns and actively tracking the most impactful cyber threats. These findings are fed back into the solutions that ultimately power Trellix’s products.
View the Tools & Techniques LibraryOur Summer 2022 threat report details the evolution of Russian cybercrime, research into medical devices and access control systems.
A light-reading publication featuring the most impactful vulnerabilities every month
The Trellix Threat Labs Vulnerability Research team has found an unauthenticated remote code execution vulnerability, filed under CVE-2022-32548 affecting multiple DrayTek routers.
Read MoreToday Trellix Threat Labs is excited to announce the release of a whitepaper dedicated to 5G and its potential security concerns. As we look at the potential of 5G, we foresee it impacting nearly every facet of digital life in the developed world.
Read MoreIn February 2016, news broke about what is now known as the ‘Bangladesh Bank Heist’. Hackers attempted to transfer nearly one billion USD through the SWIFT system towards recipients at other banks.
Read MoreThe medical industry is at unique risk of attack due to the numerous purpose-built devices. Their lack of ubiquity creates a false sense of security and reduced scrutiny from the security research industry.
Read MoreWe have frequently used code comparisons and visualizations but would it be possible to compare malware samples using a more abstract technique? What about sound?
Read MoreVulnerabilities in an industrial control system used to grant physical access to privileged facilities and integrate with more building automation deployments.
Read MoreTrellix researchers investigate the attack surfaces in autonomous vehicles as well as the machine learning algorithms and physical-to-digital attacks related to them.
Learn MoreTrellix researchers investigate multiple areas of critical infrastructure implementations, including human machine interface (HMI) software, programmable logic controllers (PLCs), and network protocols, such as MODBUS, ICCP, and others.
Learn MoreOur research explores medical devices, networks, protocols, and security practices to help healthcare organizations innovate securely.
Learn MoreOur research looks at radio frequency, including near-field communications (NFC and RFID) and wireless transmissions to determine potential impacts to network and proximity devices.
Learn MoreBy discovering and disclosing critical vulnerabilities in the world’s most popular software, the Trellix threat labs team continuously reduces the overall attack surface for one of the most attractive targets for cybercriminals.
Learn MoreOur researchers look for vulnerabilities in consumer devices to identify threats and guide manufacturers toward more secure products, reducing the potential for attackers to gain access to home or business networks.
Learn More