Search
Keyword: bkdr_gspot20.a
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.It does not have any propagati...
When installed, this malware creates no icon. It creates a backdoor to the device to allow remote access and control to the device.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when v...
This malware variant is designed to compromise Apple OS X systems. It drops files for its keylogging routine in order to steal information from the affected system.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the ...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.It does not have any i...
Microsoft addresses the following vulnerabilities in its September batch of patches:
(MS10-061) Vulnerability in Print Spooler Service Could Allow Remote Code Execution (2347290)Risk Rating: ...
Microsoft addresses several vulnerabilities in its May security bulletin. Trend Micro Deep Security covers the following:
CVE-2020-1062 - Internet Explorer Memory Corruption Vulnerability
Risk Rating: ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.This is the Trend Micro detect...
This malware is capable of running remote sessions on a system over a network. It is capable of sending commands to a remote system using a General User Interface.This backdoor arrives on a system as a file dropped by other malware or as a file down...
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run ...
Software vulnerabilities, like the malware, have serious security implications. We recently reported about a Chinese high school Web page that exploited a vulnerability in Microsoft XML Core ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware packages.It executes the downloaded files. As a re...
Microsoft addresses the following vulnerabilities in its October batch of patches:
(MS11-075) Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution (2623699)
Risk Ra...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user.
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.This...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user.It requires being executed with a specific argument/parameter...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.It executes commands from a ...
This Linux backdoor has increased potential for damage, propagation, or both, that it possesses. Specifically, it is capable of carrying brute force attacks or exploit on the D-Link Internet router.To get a one-glance comprehensive view of the behavi...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It joins an Internet Relay Chat (IRC) channel.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.