• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Vulnerabilities

ZDI Update: Microsoft and Adobe Patch Tuesday for May 2016 and Microsoft Closes Pwn2Own 2016 Vulnerabilities

  • Posted on:May 12, 2016
  • Posted in:Vulnerabilities
  • Posted by:Christopher Budd (Global Threat Communications)
0
Open-source malware presents challenges to companies and individuals alike.

This month’s Microsoft and Adobe Patch Tuesday is a huge release from both vendors. Microsoft has released fifteen bulletins that address a total of 33 vulnerabilities for their products. Adobe has released one security bulletin that addresses a total of 92 vulnerabilities for Adobe Acrobat and Reader. All total, Microsoft and Adobe patched 125 vulnerabilities…

Read More

Threat Update on Remote Root Vulnerability in HID Door Controllers

  • Posted on:May 10, 2016
  • Posted in:Vulnerabilities
  • Posted by:Christopher Budd (Global Threat Communications)
0
Encryption is  necessary for the function of a healthy Internet community.

There’s been a recent development in the threat environment around the Remote Root Vulnerability in HID Door Controllers that we wanted to alert customers to. You might recall on March 30, 2016, our Zero Day Initiative published an advisory around a vulnerability that Ricky “HeadlessZeke” Lawshae with our DVLabs group discovered. This was for a…

Read More

Uninstall Apple® QuickTime to Protect Your PC From Security Vulnerabilities

  • Posted on:May 10, 2016
  • Posted in:Vulnerabilities, Web Security
  • Posted by:Christopher Budd (Global Threat Communications)
0
Staying updated about current security threats can help ensure protection for the future.

Recently, Apple made an announcement that everyone should be familiar with. They announced that they are no longer supporting QuickTime for Microsoft Windows. In particular, they’re not going to fix any more security vulnerabilities in it. There are already two known security vulnerabilities with QuickTime for Windows now. Trend Micro’s Zero Day Initiative reported them…

Read More

Pwn2Own 2016 Opens Tomorrow

  • Posted on:March 15, 2016
  • Posted in:Network, Security, Vulnerabilities
  • Posted by:Christopher Budd (Global Threat Communications)
0

Pwn2Own 2016 starts tomorrow at March 16, 2016, at CanSecWest 2016 at the Sheraton Wall Centre in Vancouver, British Columbia. Over the next two days teams will be attempting to demonstrate new zero-day vulnerabilities in Google Chrome, Microsoft Edge, and Adobe Flash on Microsoft Windows 10 64-Bit, and Apple Safari on Mac OS X El…

Read More

No One-Trick Pony Please

  • Posted on:December 18, 2015
  • Posted in:Security, Targeted Attacks, Vulnerabilities
  • Posted by:
    Bob Corson
1

On December 8th, 2015 the International Computer Security Association (ICSA) announced the results of the advanced threat defense (ATD) solution certification testing. Given Trend Micro’s track record of active participation in industry tests such as, NSS Labs Breach Detection testing, the results of the ICSA test further demonstrates the detection efficacy of Deep Discovery. This…

Read More

Taking Stock of Pawn Storm Zero-Day Vulnerabilities

  • Posted on:October 21, 2015
  • Posted in:Security, Vulnerabilities
  • Posted by:Christopher Budd (Global Threat Communications)
0

With the most recent Oracle Critical Patch Update that addresses Java CVE-2015-4902, we have the second Pawn Storm-related vulnerability to be patched in less than a week. This also fixes the second Java vulnerability in use in zero-day attacks related to Pawn Storm since July 2015. In total, Trend Micro’s Vulnerability Research Teams, working with…

Read More

Malicious Code Slips into Apple’s Walled Garden: Millions of iOS Devices Affected

  • Posted on:September 22, 2015
  • Posted in:Consumer, Mobile Security, Security, Vulnerabilities
  • Posted by:Christopher Budd (Global Threat Communications)
0

As the mobile malware epidemic has raged on the Android platform, people on iOS have been relatively safe. There are many reasons why this is the case, but one of the chief reasons is that Apple has claimed that they keep their “walled garden” safe meaning that they keep malicious code and malware from entering…

Read More

Introducing Trend Micro Deep Security 9.6

  • Posted on:August 25, 2015
  • Posted in:Cloud Security, Security, Virtualization, Vulnerabilities
  • Posted by:
    Mike Smith
0

As many of you already know, Trend Micro Deep Security delivers a comprehensive security platform optimized for the virtual and cloud environments. Deep Security 9.6 was recently launched and builds upon a rich history of being the only true single security platform with advanced threat protection capabilities built to work seamlessly with key virtualization and…

Read More

Advising You about Malvertising

  • Posted on:August 5, 2015
  • Posted in:Hacks, Security, Vulnerabilities
  • Posted by:
    Jon Clay (Global Threat Communications)
0

This week we learned of a concerted cybercriminal effort to subvert the Yahoo ad network, which could have affected the 6.9 billion monthly visitors to their site. The threat actors behind this attack utilized a few threats we’ve seen recently, such as malvertisements and exploit kits. Malvertisements are malicious ads designed and placed by cybercriminals…

Read More

The Show Goes On—More “Stagefright” Horrors with Auto-Play Videos

  • Posted on:July 31, 2015
  • Posted in:Android, Security, Vulnerabilities
  • Posted by:Christopher Budd (Global Threat Communications)
0

Trend Micro researchers are now disclosing additional details about one of the vulnerabilities (CVE-2015-3824) in the so-called “Stagefright” cluster affecting Android users. The “Stagefright” vulnerability is actually a marketing label for a cluster of seven individual vulnerabilities. One of the vulnerabilities in this cluster, CVE-2015-3824, was independently discovered by Trend Micro’s research team at the…

Read More
Page 2 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Cloud-based Email Threats Capitalized on Chaos of COVID-19
  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.