Search
Keyword: possible
Description Name: Possible EQUATED - Remote Code Execution - SMB (Request) . This is Trend Micro detection for SMB network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type...
Description Name: Possible WEBLOGIC T3 RCE Exploit - TCP (Request) . This is Trend Micro detection for TCP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of netw...
Description Name: Possible Directory Traversal Exploit Attempted SENSOR - HEADERS - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The ...
Description Name: POSSIBLE USERAGENT RCE EXPLOIT - HTTP (REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of netw...
Description Name: Possible SSL CVE-2014-0224 CCS Injection - Class 1 . This is Trend Micro detection for TCP, SSL and HTTPS network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting ...
Description Name: POSSIBLE XSS Variant 2 - HTTP (REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network beha...
Description Name: KindEditor Possible WebShell File Upload Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of networ...
Description Name: Possible CVE-2019-1224 Server Information Disclosure Exploit - RDP (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The hos...
Description Name: Possible PLUGX UDP Request . This is Trend Micro detection for packets passing through UDP network protocols that manifests Callback activities which can be a potential intrusion. Below are some indicators of unusual behavior:Suspic...
Description Name: POSSIBLE JSP WEBSHELL UPLOAD EXPLOIT - HTTP (REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type o...
Description Name: POSSIBLE CVE-2023-23415 - REMOTE CODE EXECUTION - ICMP(REQUEST) . This is Trend Micro detection for ICMP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting t...
Description Name: POSSIBLE HTTP URI OGNL EXPRESSION EXPLOIT - HTTP (REQUEST) - Variant 3 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhib...
Description Name: POSSIBLE HTTP BODY OGNL EXPRESSION EXPLOIT - HTTP (REQUEST) - Variant 2 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhi...
Description Name: Possible STEALBIT Exfiltration - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that manifests unusual behavior which can be a potential intrusion. Below are some indicators of unus...
install a security software that can detect malware thus preventing system infection and possible information theft.
insertion of a certain IFRAME tag. NOTES: Once an unsuspecting user visits an affected Web page, this HTML iframe connects to the following URLs to download possible malicious scripts. http://www.{BLOCKED
wild. It is a heuristic detection based on well-established characteristics inherent to compressed malware. To keep customers a step ahead from possible malware infections, all executable files found in
user accesses the said website. NOTES: This is the Trend Micro detection for Java files used as a component of another malware. This malware is used to download files. A URL where a possible malicious
wild. It is a heuristic detection based on well-established characteristics inherent to compressed malware. To keep customers a step ahead from possible malware infections, all executable files found in
wild. It is a heuristic detection based on well-established characteristics inherent to compressed malware. To keep customers a step ahead from possible malware infections, all executable files found in