{"id":60405,"date":"2026-03-31T00:00:00","date_gmt":"2026-03-31T00:00:00","guid":{"rendered":"urn:uuid:ea299908-8a8c-9124-e9d2-c198c16eefde"},"modified":"2026-03-31T00:00:00","modified_gmt":"2026-03-31T00:00:00","slug":"trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/","title":{"rendered":"TrendAI\u2122 Research at RSAC 2026: Advancing Defense Across AI\u2011Driven and Cyber\u2011Physical Threats"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/RSAC1_for_thumbnail:Large?qlt=80\"><!-- OneTrust Cookies Consent Notice start for trendmicro.com --><!-- OneTrust Cookies Consent Notice end for trendmicro.com --> <head> <meta charset=\"UTF-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1\"> <meta name=\"description\"> <meta name=\"robots\" content=\"index,follow\"> <meta name=\"keywords\"> <meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge,chrome=1\"> <meta name=\"template\" content=\"article1withouthero\"> <meta property=\"article:published_time\" content=\"2026-03-31\"> <meta property=\"article:tag\" content=\"artificial intelligence (ai)\"> <meta property=\"article:section\" content=\"latest news\"> <link rel=\"icon\" type=\"image\/ico\" href=\"\/content\/dam\/trendmicro\/favicon.ico\"> <link rel=\"canonical\" href=\"https:\/\/www.trendmicro.com\/en_us\/research\/26\/c\/trendai-research-at-rsac-2026.html\"> <title>TrendAI\u2122 Research at RSAC 2026: Advancing Defense Across AI\u2011Driven and Cyber\u2011Physical Threats | Trend Micro (US)<\/title> <link href=\"https:\/\/fonts.googleapis.com\/css?family=Open+Sans:300,300i,400,400i,600\" rel=\"stylesheet\">\n<link href=\"\/\/customer.cludo.com\/css\/296\/1798\/cludo-search.min.css\" type=\"text\/css\" rel=\"stylesheet\"> <link rel=\"stylesheet\" href=\"\/etc.clientlibs\/trendmicro\/clientlibs\/trendmicro-core-2\/clientlibs\/header-footer.min.cc255fd374a145c2653503eb2da45983.css\" type=\"text\/css\">\n<link rel=\"stylesheet\" href=\"\/etc.clientlibs\/trendresearch\/clientlibs\/clientlib-trendresearch.min.47ce60d92d94610907e7a2cbd6fbca69.css\" type=\"text\/css\"> <meta property=\"og:url\" content=\"https:\/\/www.trendmicro.com\/en_us\/research\/26\/c\/trendai-research-at-rsac-2026.html\"><br \/>\n<meta property=\"og:title\" content=\"TrendAI\u2122 Research at RSAC 2026: Advancing Defense Across AI\u2011Driven and Cyber\u2011Physical Threats\"><br \/>\n<meta property=\"og:site_name\" content=\"Trend Micro\"><br \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/26\/RSAC1_for_thumbnail.jpg\"><br \/>\n<meta property=\"og:locale\" content=\"en_US\"> <meta name=\"twitter:card\" content=\"summary_large_image\"><br \/>\n<meta name=\"twitter:site\" content=\"@TrendMicro\"><br \/>\n<meta name=\"twitter:title\" content=\"TrendAI\u2122 Research at RSAC 2026: Advancing Defense Across AI\u2011Driven and Cyber\u2011Physical Threats\"><br \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/26\/RSAC1_for_thumbnail.jpg\"> <meta name=\"user-country-code\" content=\"KR\"> <\/head> <body class=\"articlepage page basicpage context-business\" id=\"readabilityBody\" readability=\"49.59209157128\"> <!-- Page Scroll: Back to Top --> <a id=\"page-scroll\" title=\"VerticalPageScroll\" href=\"javascript:jumpScroll($(this).scrollTop());\"> <span class=\"icon-chevron-up\"><\/span> <\/a> <!-- \/* Data Layers *\/ --> <\/p>\n<div class=\"root responsivegrid\">\n<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12 \">\n<div class=\"articleBodyNoHero aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"research-layout article container\" role=\"contentinfo\">\n<article class=\"research-layout--wrapper row\" data-article-pageid=\"1869071339\">\n<div class=\"col-xs-12 col-md-12 one-column\">\n<div class=\"col-xs-12 col-md-12\" readability=\"9\">\n<div class=\"article-details\" role=\"heading\" readability=\"38\"> <span class=\"article-details__bar\" role=\"img\"><\/span> <\/p>\n<p class=\"article-details__display-tag\">Artificial Intelligence (AI)<\/p>\n<p class=\"article-details__description\">TrendAI\u2122 Research explored agentic AI cybercrime and EV infrastructure security through two research sessions at RSAC 2026.<\/p>\n<p class=\"article-details__author-by\">By: TrendAI\u2122 Research <time class=\"article-details__date\">Mar 31, 2026<\/time> <span>Read time:&nbsp;<\/span><span class=\"eta\"><\/span> (<span class=\"words\"><\/span> words) <\/p>\n<div class=\"article-details__icons\"> <!--Add This--> <\/p>\n<div class=\"a2a_kit a2a_default_style\" data-a2a-icon-color=\"#717172\"> <a class=\"a2a_dd addthis_link\" href=\"https:\/\/www.addtoany.com\/share\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/etc.clientlibs\/trendresearch\/clientlibs\/clientlib-trendresearch\/resources\/img\/share-more.svg\" class=\"svg-icon\" alt=\"Share\"> <\/a> <a class=\"a2a_button_print addthis_link\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/etc.clientlibs\/trendresearch\/clientlibs\/clientlib-trendresearch\/resources\/img\/printer.svg\" class=\"svg-icon\" alt=\"Print\"> <\/a> <\/div>\n<p> <!--Add to Folio--> <!--Subscribe--> <\/div>\n<\/div><\/div>\n<\/p><\/div>\n<hr class=\"research-layout-divider\"> <main class=\"main--content col-xs-12 col-lg-8 col-lg-push-2\"> <\/p>\n<div>\n<div class=\"richText\" readability=\"36.525371287129\">\n<div readability=\"19.480198019802\">\n<p>The 35th Annual <a href=\"https:\/\/www.rsaconference.com\/\" target=\"_blank\">RSA Conference (RSAC)<\/a> returned to San Francisco from March 23-26, 2026, uniting the global cybersecurity community under the theme of \u201cThe Power of Community.\u201d Set against a landscape of rapid technological shifts and increasingly sophisticated adversaries, the event emphasized the need for intelligence\u2011led collaboration. Among the many pressing issues discussed, agentic AI stood out as one of the defining topics of the multi-day event.<\/p>\n<p>The conference opened with industry leaders reflecting on the need for integrated perspectives to tackle today\u2019s increasingly complex threats. This view helped frame the participation of TrendAI\u2122 throughout the week, with a focus on research\u2011driven insight into the simultaneous evolution of digital and cyber\u2011physical threat landscapes.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"richText\" readability=\"29.365439093484\">\n<div readability=\"14.481586402266\">\n<p><span class=\"body-subhead-title\">Anticipating the rise of agentic AI-driven cybercrime<\/span><\/p>\n<p>Robert McArdle, Director of Cybercrime Research, TrendAI\u2122, and Stephen Hilt, Principal Threat Researcher, TrendAI\u2122, presented \u201c<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/the-next-phase-of-cybercrime-agentic-ai-and-the-shift-to-autonomous-criminal-operations\" target=\"_blank\">VibeCrime: Preparing for the Next Generation of Agentic AI Cybercrime<\/a>.\u201d Their session detailed how cybercrime is evolving toward autonomous, AI\u2011driven operations.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/26\/c\/trendai-research-at-rsac-2026\/RSAC_1.jpg\" alt=\"Figure 1. TrendAI\u2122 Research\u2019s Stephen Hilt and Robert McArdle take the stage at RSAC 2026 to discuss agentic AI-driven cybercrime\"> <\/p>\n<div class=\"caption-image-container \"><figcaption>Figure 1. TrendAI\u2122 Research\u2019s Stephen Hilt and Robert McArdle take the stage at RSAC 2026 to discuss agentic AI-driven cybercrime<\/figcaption><\/div>\n<\/figure><\/div>\n<div class=\"richText\" readability=\"39.647422680412\">\n<div readability=\"26.109278350515\">\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/the-next-phase-of-cybercrime-agentic-ai-and-the-shift-to-autonomous-criminal-operations\" target=\"_blank\">Drawing on research from TrendAI<\/a>\u2122, Hilt and McArdle described a layered criminal AI architecture in which specialized agents handle tasks such as reconnaissance, targeting, social engineering, and extortion, while an orchestration layer dynamically adjusts tactics and evades defenses. Proof\u2011of\u2011concept examples demonstrated how agentic systems can already automate ransomware data analysis, generate personalized extortion messages, and scale high\u2011volume social engineering campaigns that were previously too costly or complex to sustain.<\/p>\n<p>The session closed with an examination of how the cybercrime ecosystem is evolving, particularly as agentic AI approaches broader economic adoption. With attackers increasingly capable of orchestrating faster, more resilient, and more autonomous campaigns, the discussion emphasized the importance for organizations to invest in AI\u2011driven, continuously operating security capabilities that can keep pace with this shift.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"richText\" readability=\"37.5\">\n<div readability=\"20\">\n<p><span class=\"body-subhead-title\">Revealing infrastructure blind spots in automotive cybersecurity<\/span><\/p>\n<p>Extending the research narrative into the cyber-physical domain, Trend Micro subsidiary VicOne presented insights from \u201cNIST 8473 to the Rescue: EV Charging Standards Being Hacked in Pwn2Own,\u201d delivered by Philippe Z Lin, Senior Threat Researcher, TrendAI\u2122, and Shin Li, Staff Threat Researcher, Automotive CyberThreat Research Lab, VicOne.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/26\/c\/trendai-research-at-rsac-2026\/RSAC_2.jpeg\" alt=\"Figure 2. TrendAI\u2122 Research\u2019s Philippe Lin and VicOne\u2019s Shin Li highlighted systemic cybersecurity risks across the EV charging ecosystem\"> <\/p>\n<div class=\"caption-image-container \"><figcaption>Figure 2. TrendAI\u2122 Research\u2019s Philippe Lin and VicOne\u2019s Shin Li highlighted systemic cybersecurity risks across the EV charging ecosystem<\/figcaption><\/div>\n<\/figure><\/div>\n<div class=\"richText\" readability=\"44.0625\">\n<div readability=\"36.5625\">\n<p>Drawing on <a href=\"https:\/\/vicone.com\/blog\/from-pwn2own-automotive-how-zero-day-vulnerabilities-expose-gaps-in-evse-cybersecurity-standards\" target=\"_blank\">real world findings from the Pwn2Own Automotive competition and related VicOne research<\/a>, the speakers demonstrated how Pwn2Own has become one of the most effective environments for uncovering exploitable vulnerabilities in electric vehicle supply equipment (EVSE), offering defenders concrete visibility into attacker techniques targeting charging infrastructure.<\/p>\n<p>The session highlighted that while numerous regulations and standards apply to EV and charging systems, most focus on specific components in isolation. In practice, many of the most critical vulnerabilities emerge at the interfaces between systems, where responsibilities, assumptions, and security controls often fail to align.<\/p>\n<p>The discussion pointed to NIST IR 8473 as one of the most comprehensive cybersecurity profiles for EV and extreme fast charging infrastructure. Although not mandatory, the speakers recommended its adoption by EV charging pile vendors as a practical, unifying framework for reducing systemic risk across the EV charging ecosystem.<\/p>\n<p>As connected vehicles and charging networks continue to evolve into highly software-defined environments, the session reinforced the importance of secure-by-design engineering, continuous vulnerability research, and deeper collaboration among automakers, suppliers, and infrastructure operators to strengthen resilience across the broader mobility ecosystem.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"richText\" readability=\"35\">\n<div readability=\"15\">\n<p><span class=\"body-subhead-title\">Key takeaways from RSAC 2026<\/span><\/p>\n<p>The research that TrendAI\u2122 presented across two sessions at RSAC 2026 highlighted a clear inflection point for defenders: cyberthreats are becoming faster, more autonomous, and more adaptive than traditional security models can handle. From the emergence of agentic AI\u2011driven cybercrime to systemic weaknesses in EV charging infrastructure, adversaries are increasingly operating at machine speed across both digital and cyber-physical environments.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/26\/c\/trendai-research-at-rsac-2026\/RSAC_3.jpg\" alt=\"Figure 3. TrendAI\u2122 delegates share a moment at RSAC 2026\"> <\/p>\n<div class=\"caption-image-container \"><figcaption>Figure 3. TrendAI\u2122 delegates share a moment at RSAC 2026<\/figcaption><\/div>\n<\/figure><\/div>\n<div class=\"richText\" readability=\"38\">\n<div readability=\"21\">\n<p>TrendAI\u2122 also hosted immersive, invite\u2011only activations during RSAC 2026 as a forum for practical dialogue. Through customer use cases, peer discussion, and hands\u2011on engagement with the TrendAI Vision One\u2122 platform, security leaders explored how AI\u2011driven insights can be operationalized to stay proactively secure.<\/p>\n<p>Ultimately, the takeaway from RSAC 2026 is clear: defending against the next generation of threats will require a combination of rigorous research, shared community insight, and security platforms designed to operate at machine speed.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<section class=\"tag--list\">\n<p>Tags<\/p>\n<\/section>\n<p> <\/main> <\/article>\n<\/div>\n<\/div><\/div>\n<\/div>\n<p> <!-- \/* Core functionality javascripts, absolute URL to leverage Akamai CDN *\/ --> <!--For Modal-start--> <\/p>\n<p> <span>sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk<\/span> <\/p>\n<p> <!--For Modal-end--> <\/body> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/26\/c\/trendai-research-at-rsac-2026.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>TrendAI\u2122 Research explored agentic AI cybercrime and EV infrastructure security through two research sessions at RSAC 2026. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9534],"class_list":["post-60405","post","type-post","status-publish","format-standard","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-latest-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>TrendAI\u2122 Research at RSAC 2026: Advancing Defense Across AI\u2011Driven and Cyber\u2011Physical Threats 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai\u2011driven-and-cyber\u2011physical-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TrendAI\u2122 Research at RSAC 2026: Advancing Defense Across AI\u2011Driven and Cyber\u2011Physical Threats 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai\u2011driven-and-cyber\u2011physical-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-31T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/RSAC1_for_thumbnail:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"TrendAI\u2122 Research at RSAC 2026: Advancing Defense Across AI\u2011Driven and Cyber\u2011Physical Threats\",\"datePublished\":\"2026-03-31T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/\"},\"wordCount\":783,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/RSAC1_for_thumbnail:Large?qlt=80\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Latest News\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/\",\"name\":\"TrendAI\u2122 Research at RSAC 2026: Advancing Defense Across AI\u2011Driven and Cyber\u2011Physical Threats 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/RSAC1_for_thumbnail:Large?qlt=80\",\"datePublished\":\"2026-03-31T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/#primaryimage\",\"url\":\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/RSAC1_for_thumbnail:Large?qlt=80\",\"contentUrl\":\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/RSAC1_for_thumbnail:Large?qlt=80\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"TrendAI\u2122 Research at RSAC 2026: Advancing Defense Across AI\u2011Driven and Cyber\u2011Physical Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TrendAI\u2122 Research at RSAC 2026: Advancing Defense Across AI\u2011Driven and Cyber\u2011Physical Threats 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai\u2011driven-and-cyber\u2011physical-threats\/","og_locale":"en_US","og_type":"article","og_title":"TrendAI\u2122 Research at RSAC 2026: Advancing Defense Across AI\u2011Driven and Cyber\u2011Physical Threats 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai\u2011driven-and-cyber\u2011physical-threats\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2026-03-31T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/RSAC1_for_thumbnail:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"TrendAI\u2122 Research at RSAC 2026: Advancing Defense Across AI\u2011Driven and Cyber\u2011Physical Threats","datePublished":"2026-03-31T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/"},"wordCount":783,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/RSAC1_for_thumbnail:Large?qlt=80","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Latest News"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/","url":"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/","name":"TrendAI\u2122 Research at RSAC 2026: Advancing Defense Across AI\u2011Driven and Cyber\u2011Physical Threats 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/RSAC1_for_thumbnail:Large?qlt=80","datePublished":"2026-03-31T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/#primaryimage","url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/RSAC1_for_thumbnail:Large?qlt=80","contentUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/RSAC1_for_thumbnail:Large?qlt=80"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/trendai-research-at-rsac-2026-advancing-defense-across-ai%e2%80%91driven-and-cyber%e2%80%91physical-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"TrendAI\u2122 Research at RSAC 2026: Advancing Defense Across AI\u2011Driven and Cyber\u2011Physical Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/60405","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=60405"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/60405\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=60405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=60405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=60405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}