{"id":59829,"date":"2025-12-10T00:00:00","date_gmt":"2025-12-10T00:00:00","guid":{"rendered":"urn:uuid:be28d7f8-6fae-a25f-6383-7a2f673f61f6"},"modified":"2025-12-10T00:00:00","modified_gmt":"2025-12-10T00:00:00","slug":"trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\/","title":{"rendered":"Trend Vision One\u2122 Stacks Up Against Scattered Spider and Mustang Panda in 2025 MITRE ATT&amp;CK\u00ae Evaluations"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cloud-automation-2025-mitre-attack-round-7:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/25\/cloud-automation-2025-mitre-attack-round-7.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><span class=\"body-subhead-title\">The 2025 MITRE ATT&amp;CK\u00ae Evaluations once again put the world\u2019s leading cybersecurity platforms to the test, and Trend Vision One accepted the challenge.<\/span><\/p>\n<p>This year\u2019s evaluation, the Enterprise Round 7 (ER7), introduced the most complex and realistic test environment to date, simulating multi-stage, hybrid attacks spanning on-premises systems, cloud workloads, and containerized applications.<\/p>\n<p>In an evaluation that demanded autonomous, correlated detections and real-time protection, we believe Trend Vision One delivered exceptional performance across all phases of the attack chain. In our view, this reinforces our position as a trusted leader in detection and response innovation, providing you with reliable, real-time threat detection and response to strengthen security and operational efficiency.<\/p>\n<p>This cycle included 11 participating vendors. As always, MITRE does not rank or score solutions. Instead, it provides transparent data that organizations can interpret based on their own operational requirements. That said, organizations should focus on the data most relevant to their environment, including detection coverage, alert fidelity, protection performance, and cloud visibility<\/p>\n<p><span class=\"body-subhead-title\">A new era of testing: What\u2019s new in MITRE ATT&amp;CK Evaluations ER7 (2025)<\/span><\/p>\n<p>The 2025 evaluation marked a significant evolution in MITRE\u2019s approach. Unlike previous years, this round now includes both on-premises and cloud-based attacks, as well as the Reconnaissance tactic. This not only simulates hybrid environments that real SOC teams defend against today but also highlights the necessity for SOC teams to rely on effective enterprise tools. This enables you to identify and stop threats in motion, providing central visibility for both preventive and detection methodologies.<\/p>\n<p>Specifically, to mirror modern enterprise stacks, MITRE added AWS workloads, identity and access management (IAM) manipulation, and Docker-based applications (GitLab, Airbyte, AuthenTik, WeKan).<\/p>\n<p>This directly tested whether solutions can:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Identify early attacker behaviors and prevent activities where possible<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Surface high-fidelity alerts without excessive noise, while correlating low-signal events<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Detect activities related to identity probing on the endpoint as it affects cloud-based assets<\/span><\/li>\n<\/ul>\n<p>The emulations this year specifically featured two advanced adversaries.<\/p>\n<p><b><u>Scenario 1: Emulation inspired by \u201cScattered Spider.\u201d<\/u><\/b><\/p>\n<p>This financially motivated threat group is known for:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Unified social engineering and MFA bypass techniques<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Session hijacking<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Identity abuse in cloud environments<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Lateral movement using cloud-native tools<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Rapid exploitation of cloud console permissions<\/span><\/li>\n<\/ul>\n<p>This scenario placed heavy pressure on cloud detection as well as ingesting and logging from AWS services, an area where we believe Trend Vision One demonstrated strong analytics capabilities.<\/p>\n<p><b><u>Scenario 2: Emulation inspired by \u201cMustang Panda.\u201d<\/u><\/b><\/p>\n<p>This People\u2019s Republic of China state-sponsored espionage group focused on:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Stealth and long-term persistence<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Custom implants<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Multi-stage intrusion across platforms<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Covert command-and-control<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Data staging and exfiltration<\/span><\/li>\n<li>&nbsp;<\/li>\n<\/ul>\n<p>This tested high-fidelity behavioral analytics and the ability to surface subtle signals without high false-positive rates.<\/p>\n<p><span class=\"body-subhead-title\">Highlights from the 2025 MITRE ATT&amp;CK\u00ae Evaluations results<\/span><\/p>\n<p>In our opinion, this year\u2019s evaluation validated the progress Trend Vision One made toward a unified security operations platform, delivering strong performance across detection, protection, cloud visibility, and analytic precision.<\/p>\n<p>Key outcomes after configuration change include:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">100% analytic coverage across all major attack steps<\/span><\/li>\n<li><span class=\"rte-red-bullet\">100% protection across all evaluated attack opportunities<\/span><\/li>\n<li><span class=\"rte-red-bullet\">100% cloud layer coverage, including both detection and protection<\/span><\/li>\n<\/ul>\n<p>In our view, these results demonstrate consistent visibility from initial access through impact across modern hybrid attack surfaces, including endpoints, servers, network traffic, cloud control planes, and containerized applications. We believe these outcomes reflect several core enhancements delivered over the past year, particularly in behavioral detection, identity-aware detection, cloud-native analytics, and protection logic across Linux, Microsoft Windows, and AWS environments. Further, we see ER7 as showing the commitment of Trend Vision One in balancing alert volume and visibility by significantly reducing the number of alerts produced by Trend Vision One compared to Enterprise 2024 (ER6).<\/p>\n<p>MITRE also introduced new Docker-based application scenarios, expanding the scope of testing this year. Trend Vision One maintained a strong correlation and detection across the portions of the telemetry that were observable within our current architecture.<\/p>\n<p>While this evaluation did not yet leverage Trend Vision One\u2122 Agentic SIEM, we believe these results create a strong baseline for what your team can expect moving forward. Across the Trend Vision One AI-powered enterprise cybersecurity platform, we are delivering enhancements that include expanded third-party log ingestion, improved HTTPS and encrypted-session inspection, stronger behavioral analytics, and deeper cross-layer correlation. These improvements provide your team with clearer visibility, more accurate detections, and enhanced protection across hybrid environments.<\/p>\n<p>In our opinion, these outcomes reflect our continued progress toward more unified and efficient security operations. They highlight the strength of our platform today, while also laying the groundwork for the broader automation, correlation, and analyst-assist capabilities. This is delivered with cloud detection and response (CDR) and agentic SIEM, as well as the next generation of Trend Vision One. Our direction remains focused on giving defenders clearer visibility, faster insight, and stronger protection across every stage of the attack chain, regardless of where threats emerge.<\/p>\n<p><span class=\"body-subhead-title\">What this year\u2019s evaluation means for security teams<\/span><\/p>\n<p>This year, ER7 raised expectations and moved beyond endpoint-only testing. It reinforced the current need for platforms to automatically correlate telemetry into meaningful alerts across hybrid environments, particularly when multiple data sources must come together to explain details about a significant event.<\/p>\n<p>We believe our results this year align strongly with these shifts. In our view, Trend Vision One took a more operationally realistic approach, producing a balanced set of high-confidence alerts across all major attack steps, enough to ensure full visibility without overwhelming analysts or masking key attacker activity. To us, this balance reflects years of investment in multi-layer detection, cloud-aware analytics, identity correlation, and protection that works consistently across hybrid environments.<\/p>\n<p>As with every round, we believe MITRE\u2019s detailed breakdown offers valuable insights that help guide our solution improvements. Many of these areas align with the enhancements already underway across the Trend Vision One platform, and this year\u2019s evaluation highlighted opportunities for your team to further strengthen:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Coverage for third-party cloud and application logs<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Detection of encrypted session misuse, such as stolen cookie behavior<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Continued refinement of alert clarity through correlation and consolidation<\/span><\/li>\n<\/ul>\n<p>You benefit from a continually evolving platform with broader telemetry coverage and stronger analytics.<\/p>\n<p>These areas are already part of our ongoing development priorities, and we will continue strengthening them across the Trend Vision One platform. Our focus remains on expanding telemetry coverage, deepening behavioral analytics, and improving detection precision across hybrid environments. Above all, we are committed to transparent, continuous improvement, ensuring your team benefits from a platform that evolves with modern threats.<\/p>\n<p>This expanded telemetry coverage and deeper behavioral analytics enable your team to improve detection precision across hybrid environments and ensure continuous improvement and transparent security enhancements.<\/p>\n<p><span class=\"body-subhead-title\">About Trend Micro<\/span><\/p>\n<p>Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information between people, governments, and enterprises.<\/p>\n<p>Trend leverages security expertise and AI to protect more than 500,000 enterprises and millions of individuals across clouds, networks, endpoints, and devices worldwide.<\/p>\n<p>At the core is Trend Vision One\u2122, the only AI-powered enterprise cybersecurity platform that centralizes cyber risk exposure management and security operations, delivering layered protection across on-premises, hybrid, and multi-cloud environments.<\/p>\n<p>The unmatched threat intelligence delivered by Trend empowers organizations to proactively defend against hundreds of millions of threats every day.<br \/>Proactive security starts here. <a href=\"https:\/\/www.trendmicro.com\/en_us\/business.html\">TrendMicro.com<\/a><\/p>\n<p><span class=\"body-subhead-title\">About MITRE ATT&amp;CK\u00ae Evaluations<\/span><\/p>\n<p>ATT&amp;CK\u00ae Evaluations is built on MITRE\u2019s conflict-free, objective methodology.<\/p>\n<p>Cybersecurity vendors participate to gain insights into their products and provide defenders with greater transparency into solution capabilities.<\/p>\n<p>Using a collaborative, threat-informed, purple-teaming approach, MITRE evaluates each product\u2019s ability to detect and protect against known adversary behaviors within the ATT&amp;CK framework.<br \/>All results are publicly available at <a href=\"https:\/\/attackevals.mitre-engenuity.org\/\" target=\"_blank\">attackevals.mitre-engenuity.org<\/a><br \/>&nbsp;<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/25\/l\/cloud-automation-2025-mitre-attack-round-7.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Enterprise 2025 introduces the first full cloud adversary emulation and expanded multi-platform testing, focusing on two advanced threat areas: Scattered Spider\u2019s cloud-centric attacks and Mustang Panda\u2019s long-term espionage operations. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,10938,9520,9508,9555,9514,9534,9536],"class_list":["post-59829","post","type-post","status-publish","format-standard","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-artificial-intelligence-ai","tag-trend-micro-research-cloud","tag-trend-micro-research-endpoints","tag-trend-micro-research-exploitsvulnerabilities","tag-trend-micro-research-iot","tag-trend-micro-research-latest-news","tag-trend-micro-research-privacyrisks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trend Vision One\u2122 Stacks Up Against Scattered Spider and Mustang Panda in 2025 MITRE ATT&amp;CK\u00ae Evaluations 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trend Vision One\u2122 Stacks Up Against Scattered Spider and Mustang Panda in 2025 MITRE ATT&amp;CK\u00ae Evaluations 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-10T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cloud-automation-2025-mitre-attack-round-7:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Trend Vision One\u2122 Stacks Up Against Scattered Spider and Mustang Panda in 2025 MITRE ATT&amp;CK\u00ae Evaluations\",\"datePublished\":\"2025-12-10T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\\\/\"},\"wordCount\":1290,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/cloud-automation-2025-mitre-attack-round-7:Large?qlt=80\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Artificial Intelligence (AI)\",\"Trend Micro Research : Cloud\",\"Trend Micro Research : Endpoints\",\"Trend Micro Research : Exploits&amp;Vulnerabilities\",\"Trend Micro Research : IoT\",\"Trend Micro Research : Latest News\",\"Trend Micro Research : Privacy&amp;Risks\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\\\/\",\"name\":\"Trend Vision One\u2122 Stacks Up Against Scattered Spider and Mustang Panda in 2025 MITRE ATT&amp;CK\u00ae Evaluations 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/cloud-automation-2025-mitre-attack-round-7:Large?qlt=80\",\"datePublished\":\"2025-12-10T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/cloud-automation-2025-mitre-attack-round-7:Large?qlt=80\",\"contentUrl\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/cloud-automation-2025-mitre-attack-round-7:Large?qlt=80\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Trend Vision One\u2122 Stacks Up Against Scattered Spider and Mustang Panda in 2025 MITRE ATT&amp;CK\u00ae Evaluations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trend Vision One\u2122 Stacks Up Against Scattered Spider and Mustang Panda in 2025 MITRE ATT&amp;CK\u00ae Evaluations 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\/","og_locale":"en_US","og_type":"article","og_title":"Trend Vision One\u2122 Stacks Up Against Scattered Spider and Mustang Panda in 2025 MITRE ATT&amp;CK\u00ae Evaluations 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2025-12-10T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cloud-automation-2025-mitre-attack-round-7:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Trend Vision One\u2122 Stacks Up Against Scattered Spider and Mustang Panda in 2025 MITRE ATT&amp;CK\u00ae Evaluations","datePublished":"2025-12-10T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\/"},"wordCount":1290,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\/#primaryimage"},"thumbnailUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cloud-automation-2025-mitre-attack-round-7:Large?qlt=80","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Artificial Intelligence (AI)","Trend Micro Research : Cloud","Trend Micro Research : Endpoints","Trend Micro Research : Exploits&amp;Vulnerabilities","Trend Micro Research : IoT","Trend Micro Research : Latest News","Trend Micro Research : Privacy&amp;Risks"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\/","url":"https:\/\/www.threatshub.org\/blog\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\/","name":"Trend Vision One\u2122 Stacks Up Against Scattered Spider and Mustang Panda in 2025 MITRE ATT&amp;CK\u00ae Evaluations 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\/#primaryimage"},"thumbnailUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cloud-automation-2025-mitre-attack-round-7:Large?qlt=80","datePublished":"2025-12-10T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\/#primaryimage","url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cloud-automation-2025-mitre-attack-round-7:Large?qlt=80","contentUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cloud-automation-2025-mitre-attack-round-7:Large?qlt=80"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/trend-vision-one-stacks-up-against-scattered-spider-and-mustang-panda-in-2025-mitre-attck-evaluations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"Trend Vision One\u2122 Stacks Up Against Scattered Spider and Mustang Panda in 2025 MITRE ATT&amp;CK\u00ae Evaluations"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/59829","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=59829"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/59829\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=59829"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=59829"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=59829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}