• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Vulnerabilities

Don’t Let the Vulnera-Bullies Win. Use our free tool to see if you are patched against Vulnerability CVE-2020-0601

  • Posted on:January 17, 2020
  • Posted in:Vulnerabilities
  • Posted by:
    Trend Micro
0

So much for a quiet January! By now you must have heard about the new MicrosoftÂŽ vulnerability CVE-2020-0601, first disclosed by the NSA (making it the first Windows bug publicly attributed to the National Security Agency). This vulnerability is found in a cryptographic component that has a range of functions—an important one being the ability…

Read More

A New Playground for Cybercrime: Why Supply Chain Security Must Cover Software Development

  • Posted on:October 24, 2019
  • Posted in:Security, Vulnerabilities
  • Posted by:
    Bharat Mistry
0

Most organisations see supply chains as providers of physical goods and services. The supply chain management function in these companies usually provides the governance framework to reduce third-party risks and prevent hackers from stealing data, disrupting daily operations and affecting business continuity. But there’s another crucial part of this ecosystem which some organisations may be…

Read More
Tags: Snyksupply chain

Research Drives Protection

  • Posted on:November 13, 2018
  • Posted in:Security, Vulnerabilities
  • Posted by:
    Jon Clay (Global Threat Communications)
0

The threat landscape has changed often in the 22 years I’ve been working at Trend Micro and it will continue to change for many more years. We in cybersecurity are constantly at battle with hackers and threat actors who look to infect our customers using the many tactics available to them. Our job is to…

Read More
Tags: threat landscapevulnerability research

Drupal Latest Platform To Be Hit With Critical Vulnerability

  • Posted on:March 29, 2018
  • Posted in:Security, Vulnerabilities, Vulnerabilities & Exploits
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

Drupal is the latest platform to issue an emergency patch for a critical vulnerability. The issue (CVE-2018-7600) allows an attacker to execute code remotely with little effort. That’s bad. The Drupal team has been quick to respond and has already issued a patch and a mitigation for users unable to immediately patch. In addition to…

Read More
Tags: Current NewsVulnerabilitiesweb threats

2016 Review of Vulnerabilities

  • Posted on:March 23, 2017
  • Posted in:Security, Vulnerabilities
  • Posted by:
    Jon Clay (Global Threat Communications)
0

In our 2016 security roundup report, A Record Year for Enterprise Threats, we talked about the vulnerability landscape during the year and what trends we saw. Let’s look at some of the key aspects of what we saw in 2016. 1. Trend Micro’s Zero Day Initiative (ZDI) with support of their 3,000+ independent vulnerability researchers,…

Read More

The March 2017 Security Update Review

  • Posted on:March 14, 2017
  • Posted in:Security, Vulnerabilities, Zero Day Initiative
  • Posted by:
    Dustin Childs (Zero Day Initiative Communications)
0

Just a day before Pwn2Own kicks off its 10th anniversary, join us in looking at the security updates released by Google, Adobe, VMWare, Firefox, and Microsoft for the month of March 2017. It’s shaping up to be the largest Patch Tuesday in history, which is fitting to coincide with the largest Pwn2Own ever. tl:dr –…

Read More

Pwn2Own – The Root of Research

  • Posted on:March 2, 2017
  • Posted in:Security, Vulnerabilities, Zero Day Initiative
  • Posted by:
    Dustin Childs (Zero Day Initiative Communications)
0

Over the last decade of Pwn2Own™ competitions, different people harbored different emotions towards the contest. It’s been referred to as a blood bath for browsers, although no actual blood has ever been spilt. It has helped launch people’s careers, or at the very least, it has helped increase their notoriety. It’s been accused of crushing…

Read More

October 2016 – A brave new world of security updates

  • Posted on:October 11, 2016
  • Posted in:Network, Security, Vulnerabilities, Zero Day Initiative
  • Posted by:
    Dustin Childs (Zero Day Initiative Communications)
0
Do you know what to do after you've been hacked?

Welcome to the first Trend Micro Zero Day Initiative (ZDI) monthly patch review blog. This month, we put additional context around the major security patches released from Microsoft and Adobe. As the crisp autumn air descends upon us, it is time again to take a look at the security patches released by Adobe and Microsoft…

Read More

Announcing Advanced Threat Protection: Some announcements are better than others

  • Posted on:July 19, 2016
  • Posted in:Security, Targeted Attacks, Vulnerabilities
  • Posted by:
    TJ Alldridge
0
Details of 30,000 federal employees was leaked recently after cyber criminals breached a Department of Homeland Security database.

I have been going to the same summer camp every year since I was about 5. Back then it was 4 single moms looking for a place to bring their kids for some outdoors fun and a hope that the kids would take part in an activity long enough to get through a chapter in…

Read More

4 Ways Virtual Threat Protection System Transforms Your Thinking

  • Posted on:May 31, 2016
  • Posted in:Network, Security, Vulnerabilities
  • Posted by:
    TJ Alldridge
0

Like most boys I liked to play with trucks when I was little. I would always go over to by buddy Jeremey’s house to play and one day he pulled out this red, white and blue truck. He was giddy about his truck after a few minutes of pushing it around he said “check this…

Read More
Page 1 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRNÂŽ Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Nuffield Health Depends on Managed XDR with Trend Micro Vision One
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, MĂŠxico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, EspaĂąa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.