Search
Keyword: (ms09-012) vulnerabilities in windows could allow elevation of privilege (959454)
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
Microsoft addresses several vulnerabilities in its March batch of patches. More information are found in the Trend Micro Security Intelligence Blog.
(MS17-006) Cumulative Security Update for Int...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propagation routine.It does not have any backdoor routine.It executes the dropped file(s). As a result, malicious routin...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propagation routine.It does not have any backdoor routine.It does not have any downloading capability.It does not have a...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan may be dropped by other malware.It bypasses the Windows firewall. This allows the malware to perform its intended routine without being detected by an installed firewall.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It takes advantage of software vulnerabilities to propagate across networks.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propagation routine.It does not have any backdoor routine.It executes the dropped file(s). As a result, malicious routin...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
Microsoft addresses the following vulnerabilities in its February batch of
patches:(MS10-003) Vulnerability in Microsoft Office (MSO) Could Allow Remote Code
Execution (978214) Risk Rating: ...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:DCERPC Services1008224 - Microsoft Windows SMB Remote Code Execution Vulnerabilities (CVE-2017-0144 and CVE-2017-0146)1008225 - Microsoft Windows SMB Re...
Recent reports have indicated of a threat actor group, Equation that hit enterprises and large organizations in various industries and entities like governments, financial institutions, military, telecommunic...
Microsoft addresses the following vulnerabilities in its March batch of patches:
(MS12-017) Vulnerability in DNS Server Could Allow Denial of Service (2647170)
Risk Rating: Important
This update ...
This worm arrives via removable drives.It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.It connects to Internet Relay Chat (IRC) servers.It takes advantage of certain vul...
This worm may be downloaded from remote sites by other malware. It may arrive via peer-to-peer network shares. It may be downloaded unknowingly by a user when visiting malicious Web sites. It arrives via removable drives.It drops copies of itself. It...
This malware was involved in the Red October campaign, a series of attacks targeting diplomatic and government agencies. It drops malicious files onto the affected system and executes them, causing certain malicious routines to be exhibited.To get a ...
Microsoft addresses several vulnerabilities in its June batch of patches:
MS08-067 | Vulnerability in Server Service Could Allow Remote Code Execution (958644)
Risk Rating: Critical
This security u...
Microsoft addresses the following vulnerabilities in its February batch of patches:
(MS13-009) Cumulative Security Update for Internet Explorer (2792100)
Risk Rating: Critical
This patch a...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It steals certain information from the system and/or the user.However, as of this writing, the said sit...