• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   zero-day vulnerabilities

September Patch Tuesday Bears More Remote Desktop Vulnerability Fixes and Two Zero-Days

  • Posted on:September 10, 2019 at 10:40 pm
  • Posted in:Exploits, Vulnerabilities
  • Author:
    Trend Micro
0

Microsoft’s September Patch Tuesday covered 80 CVEs, 17 of which were rated critical, and included patches for Azure DevOps Server, Chakra Scripting engine, and Microsoft SharePoint. Sixty-two were labeled as important and included patches for Microsoft Excel, Microsoft Edge, and Microsoft Exchange. Only one was rated as moderate.

Read More
Tags: ExploitsSeptember Patch TuesdayVulnerabilitieszero-day vulnerabilities

July 2015 Patch Tuesday: Microsoft, Adobe, and Oracle Roll out Security Patches for Zero-Day Vulnerabilities

  • Posted on:July 15, 2015 at 10:03 am
  • Posted in:Vulnerabilities
  • Author:
    Bernadette Irinco (Technical Communications)
0

July proves to be pretty busy for both software vendors and security researchers as various zero-day vulnerabilities were reported. In this month’s patch Tuesday, Microsoft addressed the recently discovered zero-day vulnerability in Internet Explorer that also emerged from the Hacking Team leak. The said vulnerability, covered in MS15-065 and rated as ‘critical’, could allow attackers…

Read More
Tags: AdobeJulyMicrosoftOraclePatch Tuesdayzero-day vulnerabilities

[1Q 2015 Security Roundup] Bad Ads and Zero Days: Reemerging Threats Challenge Trust in Supply Chains and Best Practices

  • Posted on:May 19, 2015 at 4:58 am
  • Posted in:Malware
  • Author:
    Trend Micro
0

Best practices are failing. No matter how good you are at sticking to them, they can no longer guarantee your safety against the simplest threats we saw last quarter. Malicious advertisements are in the sites you frequent, data-leaking apps come preinstalled in your gadgets, and data-encrypting malware run silently in your office networks. Even the…

Read More
Tags: 1Q 2015malvertisementsMalwareroundupsecurity roundupzero-day vulnerabilities

Zero-Day Vulnerability Found in MongoDB Administration Tool phpMoAdmin

  • Posted on:March 6, 2015 at 1:38 pm
  • Posted in:Vulnerabilities
  • Author:
    Suraj Sahu (Vulnerability Research Engineer)
0

phpMoAdmin (short for PHP MongoDB administration tool) is a free and open source MongoDB GUI tool. phpMoAdmin is written in PHP and is a popular administration tool to manage the noSQL database MongoDB. A zero-day remote code execution vulnerability was seen in phpMoAdmin which allows an attacker to execute arbitrary code without requiring any authentication. The…

Read More
Tags: mongoDBphpMoAdminzero dayzero-day vulnerabilities

Old versus New: Vulnerabilities in Targeted Attacks

  • Posted on:October 26, 2014 at 4:42 pm
  • Posted in:Exploits, Targeted Attacks, Vulnerabilities
  • Author:
    Trend Micro
0

Much has been reported about the recent discovery of a cyber-espionage campaign that was launched by a group known as the “Sandworm Team.” At the very heart of this incident—a zero-day vulnerability affecting all supported versions of Microsoft Windows and Windows Server 2008 and 2012. In our analysis, the vulnerability may allow attackers to execute…

Read More
Tags: Exploitstargeted attacksVulnerabilitieszero-day exploitszero-day vulnerabilities
Page 1 of 212

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.