• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   shadowserver

ShadowServer Scans Confirm Scale of Netis Threat

  • Posted on:September 2, 2014 at 10:28 am
  • Posted in:Vulnerabilities
  • Author:
    Jonathan Leopando (Technical Communications)
1

Our friends at the ShadowServer Foundation are now scanning for the Netcore/Netis router backdoor which we found in August.  Their findings are in line with what we published then: that the vast majority of those affected in China, with more than a million scanned IP addresses currently affected by this threat. The devices at these IP addresses are vulnerable…

Read More
Tags: backdoornetcorenetisroutershadowservervulnerabilty

Portable Document Format or Portable Malware Format?

  • Posted on:February 20, 2009 at 6:03 am
  • Posted in:Exploits, Malware, Vulnerabilities
  • Author:
    Jonathan Leopando (Technical Communications)
4

The Portable Document Format, or PDF for short, has always been a popular way of distributing documents. It’s no surprise then that cybercriminals have tried to use it as a means of spreading malicious files. Yesterday, the Shadowserver Foundation underlined the severity of this problem when they released details about a new vulnerability in versions…

Read More
Tags: 0-dayAdobeadobe 0-dayadobe acrobatadobe exploitadobe pdfadobe readercomputer viruscomputer virus newsExploitfoxitMalwaremalware blogmalware removalpdfpdf 0-dayPDF exploitportable document formatshadowservertrend microzero day

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.