Trend Micro – Trend Micro – Lateral movement to machines in the network After the initial infection with Cobalt Strike, we observed that the threat actor dropped node.exe, which is…
Category: Trend Micro Research : Exploits & Vulnerabilities
Private Network 5G Security Risks & Vulnerabilities
Trend Micro – Trend Micro – The move towards 5G is accelerating as enterprises seek greater security, flexibility, and reliability in 5G than earlier cellular, wireless, or wired connectivity. And…
Celebrating 15 Years of Pwn2Own
Trend Micro – Trend Micro – Exploits & Vulnerabilities Join Erin Sindelar, Mike Gibson, Brian Gorenc, and Dustin Childs as they discuss Pwn2Own’s 15th anniversary, what we’ve learned, and how…
Security Above and Beyond CNAPPs
Trend Micro – Trend Micro – The cloud is driving transformative benefits for global organizations. But in rushing their applications and infrastructure into new computing environments, they’re also exposing business-critical…
AvosLocker Ransomware Variant Abuses Driver File to Disable Anti-Virus, Scans for Log4shell
Trend Micro – Trend Micro – Conclusion While AvosLocker has been documented for its abuse of AnyDesk for lateral movement as its preferred application, we note that other remote access…
How to better manage your digital attack surface risk
Trend Micro – Trend Micro – So, how can security leaders stay on top of their attack surface and ahead of the bad guys? By leveraging a unified cybersecurity platform…
Spring4Shell Vulnerability CVE-2022-22965 Exploited to Deploy Cryptocurrency Miners
Trend Micro – Trend Micro – Among the exploitation attempts were ones aimed at deploying cryptocurrency miners. In this section, we look at how the malicious actors behind these exploitation…
CVE-2022-22965: Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware
Trend Micro – Trend Micro – The payload from the first stage can be sent as a single request without using different headers as shown in Figure 4 and as…
An In-Depth Look at ICS Vulnerabilities Part 3
Trend Micro – Trend Micro – The items on this chart are showing what percentages of ICS-affecting vulnerabilities identified by 2021 advisories are caused by what kind of weaknesses –…
Detecting Exploitation of Local Vulnerabilities Through Trend Micro Vision One™ and Cloud One™
Trend Micro – Trend Micro – Detecting Exploitation of Local Vulnerabilities Through Trend Micro Vision One and Cloud One Exploits & Vulnerabilities We provide a guide to detecting Dirty Pipe,…