CVE-2019-11815: A Cautionary Tale About CVSS Scores

by John Simpson Vulnerabilities in the Linux kernel are not uncommon. There are roughly 26 million lines of code, with 3,385,121 lines added and 2,512,040 lines removed in 2018 alone. The sheer complexity of that much code means that vulnerabilities are bound to exist. However, what is not at all common is the existence of...

The post CVE-2019-11815: A Cautionary Tale About CVSS Scores appeared first on .


New Mirai Variant Uses Multiple Exploits to Target Routers and Other Devices

We discovered a new variant of Mirai that uses a total of 13 different exploits, almost all of which have been used in previous Mirai-related attacks. Typical of Mirai variants, it has backdoor and distributed denial-of-service (DDoS) capabilities. However, this case stands out as the first to have used all 13 exploits together in a single campaign

The post New Mirai Variant Uses Multiple Exploits to Target Routers and Other Devices appeared first on .


Trickbot Watch: Arrival via Redirection URL in Spam

We discovered a variant of the Trickbot banking trojan (detected by Trend Micro as TrojanSpy.Win32.TRICKBOT.THDEAI) using a redirection URL in a spam email. The redirection URL is a way to sidestep spam filters that may block Trickbot at the onset.

The post Trickbot Watch: Arrival via Redirection URL in Spam appeared first on .


May’s Patch Tuesday Include Fixes for ‘Wormable’ Flaw in Windows XP, Zero-Day Vulnerability

Microsoft’s May security release includes updates for 80 vulnerabilities for a number of Microsoft products, including a security update for unsupported operating systems such as Windows XP and Server 2003 not included in the mainstream customer support notification. Of the security vulnerabilities fixed in this release, six are rated Critical, 73 are rated Important or Low, and one separately posted as a mitigating update addressing an imminent "wormable" threat.

The post May’s Patch Tuesday Include Fixes for ‘Wormable’ Flaw in Windows XP, Zero-Day Vulnerability appeared first on .


Dharma Ransomware Uses AV Tool to Distract from Malicious Activities

Trend Micro recently found new samples of Dharma ransomware using a new technique: using software installation as a distraction to help hide malicious activities.

The post Dharma Ransomware Uses AV Tool to Distract from Malicious Activities appeared first on .