• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Jack Tang (Threats Analyst)

Jack Tang

Threats Analyst

Analysis of CVE-2015-2360 – Duqu 2.0 Zero Day Vulnerability

  • Posted on:June 17, 2015
  • Posted in:Vulnerabilities
  • Posted by:
    Jack Tang (Threats Analyst)
0

The recent Duqu 2.0 targeted attack used several zero-day vulnerabilities as part of its attack. One of the vulnerabilities used was CVE-2015-2360, which was fixed by MS15-061 as part of the June Patch Tuesday release. Like CVE-2015-1701, this is also in the Win32k.sys file, which is commonly targeted by attackers to bypass existing vulnerability mitigation techniques. The vulnerability…

Read More
Tags: CVE-2015-2360Duqu 2.0escalation-of-privilege vulnerability

Exploring CVE-2015-1701 — A Win32k Elevation of Privilege Vulnerability Used in Targeted Attacks

  • Posted on:May 22, 2015
  • Posted in:Exploits, Vulnerabilities
  • Posted by:
    Jack Tang (Threats Analyst)
1

Our analysis of the win32k.sys vulnerability used in a recent targeted attack reveals that it opens up an easy way to bypass the sandbox, making it a bigger threat than originally thought. As mentioned in Microsoft security bulletin MS15-051, CVE-2015-1701 is an elevation of privilege vulnerability that exists when the Win32k.sys kernel-mode driver improperly handles…

Read More
Tags: APTCVE-2015-1701Exploitsrussian dollTargeted AttackVulnerabilities

IIS at Risk: An In-Depth Look into CVE-2015-1635

  • Posted on:May 3, 2015
  • Posted in:Exploits, Vulnerabilities
  • Posted by:
    Jack Tang (Threats Analyst)
0

One of the vulnerabilities recently patched by Microsoft can be exploited in the same way as Heartbleed, and needs to be addressed immediately. Addressed in the April batch of Patch Tuesday fixes (in Microsoft Security Bulletin MS15-034, specifically), the Microsoft Windows HTTP.sys Integer Overflow vulnerability, or CVE-2015-1635, is a remote code execution vulnerability that exists in HTTP.sys, or the…

Read More
Tags: CVE-2015-1635DoSExploitMicrosoft IIS

Exploring Control Flow Guard in Windows 10

  • Posted on:January 30, 2015
  • Posted in:Vulnerabilities
  • Posted by:
    Jack Tang (Threats Analyst)
0

As operating system developers are always keen on improving exploit mitigation technology, Microsoft has enabled a new mechanism in Windows 10 and in Windows 8.1 Update 3 (released last November) by fault. This technology is called Control Flow Guard (CFG). Previous mitigation techniques like address space layout randomization (ASLR) and Data Execution Prevention (DEP) have…

Read More
Tags: Control Flow GuardWindows 10

Escaping the Internet Explorer Sandbox: Analyzing CVE-2014-6349

  • Posted on:December 3, 2014
  • Posted in:Exploits, Vulnerabilities
  • Posted by:
    Jack Tang (Threats Analyst)
0

Applications that have been frequently targeted by exploits frequently add sandboxes to their features in order to harden their defenses against these attacks. To carry out a successful exploit, an attacker will have to breach these sandboxes to run malicious code. As a result, researchers will pay particular attention to exploits that are able to…

Read More
Tags: CVE-2014-6349Internet Explorersandboxvulnerability
Page 2 of 4 ‹ 123 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.