Search
Keyword: possible
We're seeing a spike in spammed emails targeting various companies that contains the short message, I’m fine thanks, followed by a random name. Some may consider this particular spam as 'low threat' as it does not contain any malicious...
File infectors have recently seen a resurgence in the threat landscape. Prominent examples of file infectors are MUSTAN and QUERVAR. But another family of file infectors has once again made an appearance in the threat land...
Microsoft ISAPI Index Server contains a vulnerability wherein a remote attacker can access random files outside of the Web path. The affected file webhits.dll library is not properly validated user input. By C...
There is an observed increase in the number of spammed email using Better Business Bureau's name in May 2012. This particular spammed message, however, contains an attachment. ...
In December 2010, there was a noticeable dip in the volume of spam sent. This was attributed to two possible causes: the decline in spam-sending activity of Rustock botnet and the Spamit takedown last Octobe...
The MegaCortex ransomware first appeared in January 2019 with few interesting attributes, including the use of a signed executable as part of the payload. It also appeared to offer security consulting services from the malware author.On May 1, 2019,...
This Trojan may be hosted on a website and run when a user accesses the said website.This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME tag.
(MS14-024) Vulnerability in a Microsoft Common Control Could Allow Security Feature Bypass (2961033)

This security update addresses a vulnerability found in the implementation of the MSCOMCTL common controls library. Once exploited, remote attackers ...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:Database MySQL1005045* - MySQL Database Server Possible Login Brute Force AttemptWeb Application PHP Based1006432* - WordPress Slider Revolution Respon...
Firefox 1.5.0.7 and 2.0, and Seamonkey 1.1b, allows remote attackers to cause a denial of service (crash) by creating a range object using createRange, calling selectNode on a DocType node (DOCUMENT_TYPE_NODE...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It attempts to access certain websites.
This is the Trend Micro detection for possibly malicious executable files that are compressed using Win32 compression tools. This proactive detection also includes appending viruses found in the wild.It is a heuristic detection based on well-establis...
Mozilla Firefox before 2.0.0.6, Thunderbird before 1.5.0.13 and 2.x before 2.0.0.6, and SeaMonkey before 1.1.4 allow remote attackers to execute arbitrary commands via certain vectors as...
Cybercriminals take any path they can to get to your system. In this spammed message, cybercriminals use the Trend Micro name and instructs users to update their anti-malware using the attached security update in the em...
This Trojan requires its main component to successfully perform its intended routine.
What do the sites LinkedIn, eHarmony, last.fm, League of Legends, and Yahoo! have in common? All of these websites suffered from major data leaks that exposed millions of user names and passwords online. These incid...
This is the Trend Micro detection for the tool called Brutus.This hacking tool may be manually installed by a user.
Windows
NOTES: This detection is for weaponized RTF files. It detects possible exploits for the following vulnerabilities:
CVE-2017-11882
CVE-2012-0158
CVE-2015-1641
CVE-2015-1770
CVE-2014-1761
CVE-2017-8570
Step 1For Tre...
Hacking tools are applications that crack or break computer and network security measures. Hacking tools have different capabilities that have been designed to penetrate systems. Some system administrators have been known to use similar programs to t...
Hacking tools are applications that crack or break computer and network security measures. Hacking tools have different capabilities that have been designed to penetrate systems. Some system administrators have been known to use similar programs to t...