Learn about the threat types of security risks and anomalies in Correlated Intelligence that are predefined by TrendAI™.
The following table lists the threat types of security risks and anomalies that Correlated
Intelligence can detect via predefined correlation rules or Agentic AI.
|
Threat type
|
Security risk or anomaly
|
Detected by
|
Description
|
|
Phishing - Advanced Phishing
|
Security risk
|
Correlation rule
|
A type of phishing that uses more sophisticated techniques to evade detection systems.
For example, advanced phishing uses anti-bot mechanisms to prevent security solutions
from accessing the email content for analysis, or it can redirect to a legitimate
web page instead showing a phishing website to security solutions.
|
|
Phishing - Data Exfiltration
|
Security risk
|
Correlation rule
|
A type of phishing that uses various techniques to steal users' data, such as credentials.
For example, it might leverage existing form services to show a fake logon page to
users.
|
|
Suspicious Email
|
Anomaly
|
Correlation rule
|
Email with unusual traits that appear suspicious and may signal potential threats.
|
|
Possibly Unwanted Email
|
Anomaly
|
Correlation rule
|
Email that may be unsolicited and deemed undesirable or unnecessary by the recipient.
|
|
Phishing
|
Security risk
|
Agentic AI
|
Email that is identified as potential phishing content by an Agentic AI-powered detection
module.
|
|
Spam
|
Security risk
|
Agentic AI
|
Email that is identified as potential unwanted content by an Agentic AI-powered detection
module.
|
To view details about the security risks of each threat type and their associated
predefined correlation rules and detection signals, go to .
