Robert McArdle
@bobmcardle
Followers
2K
Following
8
Media
164
Statuses
2K
Director FTR - CyberCrime Research for @TrendMicro. Lecturer in Malware Analysis. Expect post ratio of 2:1 riveting & unmissable cybercrime updates / @StarWars
Joined July 2009
Today @TrendMicro researchers release a new APT publication where they introduced a new "Premier-Pass-as-a-Service" framework looking at the trend of collaboration tactics between multiple China-aligned APT groups.
trendmicro.com
0
3
11
Many businesses use the Microsoft Automate suite and the excellent power it has to automate workflows. @TrendMicro look into the risks that come from the complexity of environments likes this and the interest in targeting it by criminals https://t.co/i0kYDKR0BQ <A Must for users
trendmicro.com
Amid the rise of low-code automation, Microsoft Power Automate is becoming an attractive target for cybercriminals exploiting its complexity to evade detection and exfiltrate data – but demand for...
0
0
1
Publishing security research helps our community understand today's threats. But in an era of Vibe-coding, are some of our reports so technical that they actually enable attackers? @TrendMicro poses this as a question for our industry to consider
trendmicro.com
Security companies routinely publish detailed analyses of security incidents, making attacker tactics, techniques, and procedures (TTPs) widely known and visible. These reports often provide compre...
0
0
0
When you're at fault for a car crash insurance implications are easy. But what if it's a self driving car? Or partially automated? Or Car-as-a-Service? Or data of the event was manipulated? And thats the tip of the iceberg. @TrendMicro /@VicOneAuto report
0
1
2
Task Scams are a growing fraud type involving sophisticated online job scams that lure victims into repetitive digital tasks while systematically stripping them of funds through escalating deposit demands. https://t.co/UzMhOvvj9e < Really useful @TrendMicro research on this !
trendmicro.com
This report exposes the life cycle and tactics of task scams by presenting real-world cases as well as strategies to help identify and avoid these threats.
0
0
1
ChatGPTs Agent is a significant step forward, bringing a glimpse of Agent based AI future, but also risks. @TrendMicro look at this development using an extended version of the Digital Assistant Risk Matrix we published in December
trendmicro.com
OpenAI recently introduced ChatGPT agent. What are its capabilities and the associated cybersecurity risks? We examined these using Trend Micro’s Digital Assistant Framework to help organizations...
0
0
1
Two very useful (frankly "must read") report on #AI dropping from @TrendMicro in the same week. First up the "Road to Agentic AI" ( https://t.co/3MCPNaK8FM) and secondly the "State of AI Security Report H1 2025 ( https://t.co/d7vTmBTE4E) < Strong addition to the weekly reading list
trendmicro.com
Trend Micro’s State of AI Security report explores how AI’s rapid adoption is transforming both business efficiency and cybercrime methods, highlighting novel threats and strategic defenses to help...
1
1
1
After the Law Enforcement action on LummaStealer malware, sadly it appears to back with a bang - highlighting its resistance. Junestherry Dela Cruz from @TrendMicro looks into this resurgence in our publication today
trendmicro.com
Lumma Stealer has re-emerged shortly after its takedown. This time, the cybergroup behind this malware appears to be intent on employing more covert tactics while steadily expanding its reach. This...
1
1
2
Today @TrendMicro released a comprehensive look at how AI deepfakes are used to support criminal business processes, what toolkits criminals are exploiting to power their deepfake creation, and what the deepfake underground looks like. Check it out on https://t.co/EsQxoTDLSE :)
trendmicro.com
This report takes a comprehensive look at how deepfakes are used to support criminal business processes, what are the toolkits criminals are exploiting to power their deepfake creation, and what the...
0
0
2
My @TrendMicro colleague Bakuei Matsukawa has released a very useful research doing a proper statistical study on the impact that MDR and CREM have on reducing an Enterprises real risk of succumbing to Cyber Attacks https://t.co/3UccZFBs6R < Can't recommend this highly enough
trendmicro.com
Cyberattacks are growing increasingly sophisticated and frequent, which is why security strategies focused solely on detection and response are no longer sufficient. This reality brings renewed...
0
1
1
The reports are really good - don't let the disheveled Irish guy in the video put you off :)
What first drove Trend Micro to launch the Underground Series? Robert McArdle discusses our original mission and why ongoing threat intelligence remains critical for security teams. Watch the video and read the full research: https://t.co/Ms6ahmOT3l
0
0
1
RT @TrendMicroRSRCH: 50 reports. 14 years. One mission: Pierce the darkness shrouding the #cybercriminalunderground. Equip your team with t…
trendmicro.com
Over the years, Trend Micro researchers have published articles and research papers that detail different criminal underground communities around the world. Read about their motives, ecosystems,...
0
1
0
For almost 15 years @TrendMicro have released leading publications offering deep views into the workings of the Cybercriminal Underground. Today to celebrate our 50th publication we collect all these in one place https://t.co/rGblNPBXWT .
trendmicro.com
Over the years, Trend Micro researchers have published articles and research papers that detail different criminal underground communities around the world. Read about their motives, ecosystems,...
0
2
11
Ben and Bob do a Podcast sounds like an excellent kids books :) https://t.co/P4ZZZd4NAe (CTO of @MaltegoHQ, Ben April, interviews me on management styles in Security Research)
0
1
2
Residential Proxies are so hot right now :) This key enabler service within the criminal underground is a must to understand for network defenders and researchers alike. Luckily @TrendMicro have you covered https://t.co/1ebpfR8Yem < Well worth a read
0
0
0
10s of thousands targeted with possibly AI generated TikTok videos that have them install popular InfoStealers https://t.co/vVNmblTAEO < Nice new research from @TrendMicro on a new scalable initial attack vector
trendmicro.com
Trend™ Research uncovered a campaign on TikTok that uses videos to lure victims into downloading information stealers, a tactic that can be automated using AI tools.
0
1
3
Part 2 in @TrendMicro series on LLM vulnerabilities and security https://t.co/E7X5klTUrH . This time Sean looks at LLMs as a way for an attacker to get unauthorised Code Execution on the service. Needless to say - that would not be good. < Worth being aware for any LLM user
trendmicro.com
Our research examines vulnerabilities that affect Large Language Model (LLM) powered agents with code execution, document upload, and internet access capabilities. This is the second part of a series...
0
0
2
DPRK collaboration with Russia has been seen on the battlefields in Ukraine. @FeikeHacquebord / @sjhilt from @TrendMicro describe a campaign of DPRK posing as IT Workers to compromise Western countries, using RU IP space just a mile from the border
trendmicro.com
0
2
8
LLM & Agent security are topics anyone in security will need to know inside out. Sean Park from @TrendMicro releases Part 1 of 5 on AI Agent vulnerabilities https://t.co/raCGHjEhpx. Part 1 sets the scene in a very accessible way ahead of interesting deep dives to follow <Top Read
trendmicro.com
This introductory post kicks off a blog series on AI agent vulnerabilities, outlining key security risks like prompt injection and code execution, and sets the stage for future parts, which will dive...
0
2
1
State sponsored Linux threats can be some of the most insidious, long lasting + hard to discover. @TrendMicro release an update on BPFDoor activity https://t.co/4rFpbE7aen targeting Telco, Finance + Retail with deep technical details to assist defenders < Nice work @mer0x36 + co!
trendmicro.com
A controller linked to BPF backdoor can open a reverse shell, enabling deeper infiltration into compromised networks. Recent attacks have been observed targeting the telecommunications, finance, and...
0
6
22