• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   vulnerability

Mirai Botnet Exploit Weaponized to Attack IoT Devices via CVE-2020-5902

  • Posted on:July 28, 2020 at 4:57 am
  • Posted in:Botnets, Exploits, Vulnerabilities
  • Author:
    Fernando Mercês (Senior Threat Researcher)
0

We found an internet of things (IoT) Mirai botnet downloader exploiting CVE-2020-5902 in the wild, two weeks after getting a 10 out of 10 CVSS rating in its disclosure. Analyzing the said variant, it can also abuse nine other recently discovered security bugs in other devices.

Read More
Tags: botnetCVE-2020-5902ExploitF5 Big-IPinternet of thingsIOTMiraisoravulnerability

Busting Ghostcat: An Analysis of the Apache Tomcat Vulnerability (CVE-2020-1938 and CNVD-2020-10487)

  • Posted on:March 10, 2020 at 7:02 am
  • Posted in:Vulnerabilities
  • Author:
    Trend Micro
0

Apache Tomcat is a popular open-source Java servlet container, so the discovery of Ghostcat understandably set off some alarms. This blog entry seeks to put the most feared Ghostcat-related scenario into perspective by delving into the unlikely circumstances that would make it possible to allow an RCE through the vulnerability.

Read More
Tags: Apache Tomcatvulnerability

Patched GIF Processing Vulnerability CVE-2019-11932 Still Afflicts Multiple Mobile Apps

  • Posted on:November 25, 2019 at 5:00 am
  • Posted in:Mobile, Vulnerabilities
  • Author:
    Trend Micro
0

CVE-2019-11932, which is a vulnerability in WhatsApp for Android, was first disclosed to the public on October 2, 2019 after a researcher named Awakened discovered that attackers could use maliciously crafted GIF files to allow remote code execution. The vulnerability was patched with version 2.19.244 of WhatsApp, but the underlying problem lies in the library called libpl_droidsonroids_gif.so, which is part of the android-gif-drawable package. While this flaw has also been patched, many applications still use the older version and remain at risk.

Read More
Tags: vulnerabilitywhatsapp

SLUB Gets Rid of GitHub, Intensifies Slack Use

  • Posted on:July 16, 2019 at 5:01 am
  • Posted in:Malware, Vulnerabilities
  • Author:
    Trend Micro
0

We discovered a new version of SLUB delivered via another unique watering hole website. This malicious site used CVE-2019-0752, an Internet Explorer vulnerability discovered by Trend Micro’s Zero Day Initiative (ZDI) that was just patched this April. This is the first time we found this exploit used in the wild. This new version of the SLUB malware has stopped using GitHub as a way to communicate, heavily using Slack instead via two free workspaces.

Read More
Tags: ExploitSLUBvulnerability

CVE-2019-2725 Exploited and Certificate Files Used for Obfuscation to Deliver Monero Miner

  • Posted on:June 10, 2019 at 12:15 am
  • Posted in:Malware, Vulnerabilities
  • Author:
    Trend Micro
0

We found cryptocurrency-mining activity that involves the exploitation of the Oracle WebLogic server vulnerability CVE-2019-2725 with the interesting behavior of using certificate files as an obfuscation tactic.

Read More
Tags: cryptocurrency minerCVE-2019-2725Monerovulnerability
Page 1 of 2312 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.