• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Exploits

Outlaw Updates Kit to Kill Older Miner Versions, Targets More Systems

  • Posted on:February 10, 2020 at 1:00 pm
  • Posted in:Bad Sites, Exploits, Malware, Targeted Attacks, Vulnerabilities
  • Author:
    Trend Micro
0

We observed an increase in hacking group Outlaw’s activities in December, with updates on the kits’ capabilities reminiscent of their previous attacks.

Read More
Tags: ExploitshackingminerMoneroOutlaw

September Patch Tuesday Bears More Remote Desktop Vulnerability Fixes and Two Zero-Days

  • Posted on:September 10, 2019 at 10:40 pm
  • Posted in:Exploits, Vulnerabilities
  • Author:
    Trend Micro
0

Microsoft’s September Patch Tuesday covered 80 CVEs, 17 of which were rated critical, and included patches for Azure DevOps Server, Chakra Scripting engine, and Microsoft SharePoint. Sixty-two were labeled as important and included patches for Microsoft Excel, Microsoft Edge, and Microsoft Exchange. Only one was rated as moderate.

Read More
Tags: ExploitsSeptember Patch TuesdayVulnerabilitieszero-day vulnerabilities

BlackSquid Slithers Into Servers and Drives With 8 Notorious Exploits to Drop XMRig Miner

  • Posted on:June 3, 2019 at 5:09 am
  • Posted in:Exploits, Malware, Vulnerabilities
  • Author:
    Trend Micro
0

We found a new wormable malware we’ve named BlackSquid targeting web servers, network and removable drives using evasion, anti-virtualization, anti-debugging, and anti-sandboxing techniques to drop a Monero miner.

Read More
Tags: BlackSquidExploitsMalwareVulnerabilities

New CVE-2018-8373 Exploit Spotted

  • Posted on:September 25, 2018 at 5:05 am
  • Posted in:Exploits, Vulnerabilities
  • Author:
    Trend Micro
0

On September 18, 2018, more than a month after we published a blog revealing the details of a use-after-free (UAF) vulnerability CVE-2018-8373 that affects the VBScript engine in newer Windows versions, we spotted another exploit that uses the same vulnerability.  It’s important to note that this exploit doesn’t work on systems with updated Internet Explorer versions.

Read More
Tags: Exploits

August Patch Tuesday: A Tale of Two Zero-Days

  • Posted on:August 14, 2018 at 10:02 pm
  • Posted in:Exploits, Vulnerabilities
  • Author:
    Trend Micro
0

This month’s Microsoft Patch Tuesday includes important updates that patch two zero-day vulnerabilities that are already being actively exploited.

Read More
Tags: AdobeExploitsMicrosoftpatchPatch TuesdayVulnerabilities
Page 1 of 812 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.