• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Exploit

Mirai Botnet Exploit Weaponized to Attack IoT Devices via CVE-2020-5902

  • Posted on:July 28, 2020 at 4:57 am
  • Posted in:Botnets, Exploits, Vulnerabilities
  • Author:
    Fernando Mercês (Senior Threat Researcher)
0

We found an internet of things (IoT) Mirai botnet downloader exploiting CVE-2020-5902 in the wild, two weeks after getting a 10 out of 10 CVSS rating in its disclosure. Analyzing the said variant, it can also abuse nine other recently discovered security bugs in other devices.

Read More
Tags: botnetCVE-2020-5902ExploitF5 Big-IPinternet of thingsIOTMiraisoravulnerability

SLUB Gets Rid of GitHub, Intensifies Slack Use

  • Posted on:July 16, 2019 at 5:01 am
  • Posted in:Malware, Vulnerabilities
  • Author:
    Trend Micro
0

We discovered a new version of SLUB delivered via another unique watering hole website. This malicious site used CVE-2019-0752, an Internet Explorer vulnerability discovered by Trend Micro’s Zero Day Initiative (ZDI) that was just patched this April. This is the first time we found this exploit used in the wild. This new version of the SLUB malware has stopped using GitHub as a way to communicate, heavily using Slack instead via two free workspaces.

Read More
Tags: ExploitSLUBvulnerability

Angler and Nuclear Exploit Kits Integrate Pawn Storm Flash Exploit

  • Posted on:November 3, 2015 at 8:49 am
  • Posted in:Vulnerabilities
  • Author:
    Brooks Li and Joseph C. Chen (Threats Analysts)
1

When it comes to exploit kits, it’s all about the timing. Exploit kits often integrate new or zero-day exploits in the hopes of getting a larger number of victims with systems that may not be as up-to-date with their patches. We found two vulnerabilities that were now being targeted by exploit kits, with one being…

Read More
Tags: adobe flashAngler Exploit KitExploitexploit kitFlashnuclear exploit kitPawn Stormvulnerability

Latest Flash Exploit Used in Pawn Storm Circumvents Mitigation Techniques

  • Posted on:October 16, 2015 at 8:36 am
  • Posted in:Exploits, Targeted Attacks, Vulnerabilities
  • Author:
    Peter Pi (Threats Analyst)
2

Our analysis of the Adobe Flash zero-day vulnerability used in the latest Pawn Storm campaign reveals that the previous mitigation techniques introduced by Adobe were not enough to secure the platform. Used in Pawn Storm to target certain foreign affairs ministries, the vulnerability identified as CVE-2015-7645 represents a significant change in tactics from previous exploits. It is…

Read More
Tags: 0dayAdobeAPTExploitFlashPawn StormTargeted Attackvulnerability

Why Vulnerability Research Is A Good Thing

  • Posted on:August 14, 2015 at 1:22 am
  • Posted in:Targeted Attacks, Vulnerabilities
  • Author:Raimund Genes (Chief Technology Officer)
1

Earlier this week Oracle’s CSO released a blog post that talked about why people should stop looking for vulnerabilities in their software products. Needless to say, this did not go down well with the security community – and the post was soon taken down with a statement from the company adding that the post “does not reflect our…

Read More
Tags: ExploitJavaOraclevulnerability
Page 1 of 1112 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.