Type: Microsoft Internet Explorer is prone to a security vulnerability that may allow attackers to conduct spoofing attacks; fixes are available.Type: Microsoft Internet Explorer is prone to a security vulnerability that may allow attackers to conduct spoofing attacks; fixes are available.
Trend Micro Last June, I disclosed a use-after-free (UAF) vulnerability in Internet Explorer (IE) to Microsoft. It was rated as critical, designated as CVE-2019-1208, and then addressed in Microsoft’s September Patch Tuesday. I discovered this flaw through BinDiff (a binary code analysis tool) and wrote a proof of concept (PoC) showing how it can be More Info »
Trend Micro We recently found 49 new adware apps on Google Play, disguised as games and stylized cameras. Before they were taken down by Google, the total number of downloads for these apps was more than 3 million. This recent incident continues an ongoing trend of mobile adware surges The post 49 Disguised Adware Apps More Info »
Trend Micro By Miguel Carlo Ang and Earle Maui Earnshaw We recently saw a malicious spam campaign that has AutoIT-compiled payloads – the trojan spy Negasteal or Agent Tesla (detected by Trend Micro as TrojanSpy.Win32.NEGASTEAL.DOCGC), and remote access trojan (RAT) Ave Maria or Warzone (TrojanSpy.Win32.AVEMARIA.T) – in our honeypots. The upgrading of payloads from a More Info »