Understanding threat attribution in cybersecurity

The TrendAI framework offers a structured approach to threat attribution, emphasising evidence over labels.

  • Tuesday, 17th February 2026 Posted 2 weeks ago in by Sophie Milburn
As the cybersecurity industry navigates the complexities of threat actor identification, TrendAI, part of Trend Micro, has released a guide outlining how threat attribution should operate based on evidence, rather than relying on renaming or differences between vendors.

Variations in threat actor naming are often seen as discrepancies, but this perspective oversimplifies the underlying complexity. Different research teams may analyse distinct datasets, use different clustering methods, and reach varying confidence levels. Complete alignment across all entities is neither realistic nor necessary.

TrendAI's guide explains its approach to tracking activity using structured evidence rather than pre-existing labels. It introduces provisional SHADOW designations, which allow analysts to monitor emerging or overlapping activity without prematurely assigning firm attribution or overstating certainty.

The framework aims to clarify how attribution decisions are made within the industry, highlighting the reasons for differing naming practices and emphasising the importance of evidence over labels.

For business leaders, accurate attribution affects risk management and response planning. Overreliance on threat actor names alone can create a false sense of certainty, potentially affecting priorities and defensive measures.

When attribution decisions are reviewed by stakeholders such as boards, auditors, or regulators, labels on their own may not suffice. An evidence-based approach provides a foundation rooted in verifiable data, supporting clearer communication, justification, and adaptation as new information emerges.

The evolving role of CISOs in the AI era

Posted 3 days ago by Sophie Milburn
A survey of 650 global CISOs examines how security leaders are navigating AI adoption, expanding responsibilities, workforce challenges, and...

AI vs. human: assessing cybersecurity performance

Posted 3 days ago by Sophie Milburn
Hack The Box’s report examines the impact of AI on cybersecurity task performance, analysing productivity changes and performance differences...
Veracode's latest report highlights the widening gap between rapid software development and slower security measures, posing potential risks for...
Veeam has launched Agent Commander, a solution designed to combine data resilience with AI security, providing organisations with visibility and...
Infinigate UK & Ireland partners with OpenOrigins to combat deepfakes, enhancing trust in digital content and offering opportunities for their...
WatchGuard Technologies celebrates 30 years in the market, highlighting its long-term focus on supporting managed service providers and adapting to...

AI arms race: accelerated threat dynamics in 2026

Posted 6 days ago by Sophie Milburn
The unveiling of CrowdStrike's 2026 Global Threat Report highlights a surge in AI-enabled threats, shrinking defenders' response time.
Asimily launches 'In Flight', a new partner tier aimed at strengthening global growth in IoT security through enhanced collaboration and support...