• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Stuxnet

Microsoft Releases 14 Security Bulletins, 5 Rated ‘Critical’; Fixes FREAK Bug

  • Posted on:March 10, 2015 at 6:05 pm
  • Posted in:Vulnerabilities
  • Author:
    Danielle Veluz (Technical Communications)
0

Today Microsoft released their monthly Patch Tuesday posting, with a total of 14 security bulletins that include 5 bulletins that were listed as Critical. This batch of patches addresses vulnerabilities in Microsoft Windows, Microsoft Office, Microsoft Exchange, and Internet Explorer. Fixes for FREAK One of the more notable bugs covered by this posting include the…

Read More
Tags: FREAKPatch TuesdayStuxnet

Regin: Sophisticated Malware, But Not Without Precedent

  • Posted on:November 25, 2014 at 3:19 am
  • Posted in:Targeted Attacks
  • Author:
    Trend Micro
3

Recent reports have implicated a sophisticated piece of malware known as Regin in targeted attacks in various countries. Regin was described as being highly sophisticated and designed to carry out long-term stealthy surveillance on would-be victims at the behest of its creators, who have been suggested to be nation-states. Telecommunication companies are believed to have…

Read More
Tags: APTReginStuxnetTargeted Attack

CVE-2014-4115 Analysis: Malicious USB Disks Allow For Possible Whole System Control

  • Posted on:October 31, 2014 at 11:15 am
  • Posted in:Vulnerabilities
  • Author:
    Moony Li (Threat Analyst)
1

One of the bulletins that was part of the October 2014 Patch Tuesday cycle was MS14-063 which fixed a vulnerability in the FAT32 disk partition driver that could allow for an attacker to gain administrator rights on affected systems, with only a USB disk with a specially modified file system. This vulnerability as also designated…

Read More
Tags: CVE-2014-4115MicrosoftStuxnetUSBvulnerability

The SCADA That Cried Wolf: Who Is Really Attacking Your ICS Devices Part 2

  • Posted on:August 27, 2013 at 1:25 am
  • Posted in:Targeted Attacks
  • Author:
    Kyle Wilhoit (Senior Threat Researcher)
0

The concern on ICS/SCADA security gained prominence due to high-profile attacks targeting these devices, most notably Flame and Stuxnet. However, we noted recent findings, which prove that the interest in ICS/SCADA devices as attack platforms is far from waning. We’ve all read about how insecure ICS/SCADA devices are and how certain threat actors are targeting…

Read More
Tags: APTattackdata breachFlameICSSCADAsecurityStuxnet

Protecting Your ICS/SCADA Environment

  • Posted on:July 2, 2013 at 12:41 pm
  • Posted in:Targeted Attacks
  • Author:
    Kyle Wilhoit (Senior Threat Researcher)
0

Recently, I spoke at the Forum of Incident Response and Security Teams (FIRST) in Bangkok, Thailand on threat intelligence and incident response. The mantra throughout FIRST was “sharing to win”, the concept of which echoes throughout security got me to thinking about information sharing in the ICS/SCADA security arena. This idea of sharing thoughts and…

Read More
Tags: FlameICSSCADAStuxnet
Page 1 of 212

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.