Understanding threat attribution in cybersecurity

The TrendAI framework offers a structured approach to threat attribution, emphasising evidence over labels.

  • Tuesday, 17th February 2026 Posted 1 month ago in by Sophie Milburn
As the cybersecurity industry navigates the complexities of threat actor identification, TrendAI, part of Trend Micro, has released a guide outlining how threat attribution should operate based on evidence, rather than relying on renaming or differences between vendors.

Variations in threat actor naming are often seen as discrepancies, but this perspective oversimplifies the underlying complexity. Different research teams may analyse distinct datasets, use different clustering methods, and reach varying confidence levels. Complete alignment across all entities is neither realistic nor necessary.

TrendAI's guide explains its approach to tracking activity using structured evidence rather than pre-existing labels. It introduces provisional SHADOW designations, which allow analysts to monitor emerging or overlapping activity without prematurely assigning firm attribution or overstating certainty.

The framework aims to clarify how attribution decisions are made within the industry, highlighting the reasons for differing naming practices and emphasising the importance of evidence over labels.

For business leaders, accurate attribution affects risk management and response planning. Overreliance on threat actor names alone can create a false sense of certainty, potentially affecting priorities and defensive measures.

When attribution decisions are reviewed by stakeholders such as boards, auditors, or regulators, labels on their own may not suffice. An evidence-based approach provides a foundation rooted in verifiable data, supporting clearer communication, justification, and adaptation as new information emerges.

Empowering AI with secure identity control

Posted 2 days ago by Sophie Milburn
Ping Identity introduces “Identity for AI,” extending identity and access control to autonomous enterprise agents with real-time enforcement and...

Huntress extends ITDR solution to Google Workspace

Posted 4 days ago by Sophie Milburn
Huntress expands its Managed ITDR coverage to Google Workspace, providing organisations with enhanced detection and response for identity-based...
DigiCert updates its Document Trust Manager to support document security and global compliance as digital document use and AI-related risks increase.
AI adoption is increasing across organisations, despite ongoing concerns around security, governance, and compliance.
Fluke Corporation introduces AI-driven enhancements to eMaint CMMS/EAM, aimed at streamlining maintenance operations and improving efficiency on the...
Heimdal appoints Elovade to enhance cybersecurity accessibility in the Nordics, offering streamlined channel support.
As pressure mounts, CFOs are rethinking financial reporting to enhance decision-making and performance.
Ignition Technology collaborates with Exclusive Networks to expand its cybersecurity distribution services into the North American market.