Keyword: usoj_duqu.dec
203 Total Search   |   Showing Results : 21 - 40
Description Name: APT - DUQU - HTTP (Request) - Variant 2 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are som...
Description Name: APT - DUQU - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators...
Microsoft addresses the following vulnerabilities in its December batch of patches: (MS15-124) Cumulative Security Update for Internet Explorer (3116180) Risk Rating: Critical This security update
Microsoft addresses the following vulnerabilities in its December batch of patches: (MS16-144) Cumulative Security Update for Internet Explorer (3204059) Risk Rating: Critical This security update
Microsoft addresses several vulnerabilities in its December batch of patches, several of which addresses remote code execution vulnerabilities. CVE-2017-11885 - Windows RRAS Service Remote Code
Microsoft addresses the following vulnerabilities in its December batch of patches: (MS14-075) Vulnerabilities in Microsoft Exchange Server Could Allow Elevation of Privilege (3009712) Risk Rating:
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
Microsoft addresses vulnerabilities in its December security bulletin. Trend Micro Deep Security covers the following: CVE-2018-8631 - Internet Explorer Memory Corruption Vulnerability Risk Rating:
Pattern Version IDF First Pattern Release Date MS10-090 CVE-2010-3340 1004539 - HTML Object Memory Corruption Vulnerability 10-038 Dec 15, 2010 MS10-090 CVE-2010-3343 1004540 - Microsoft Internet Explorer
This URL is related to several DUQU variants.
This URL is related to several DUQU malware variants.
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This malware is possibly connected with DUQU malware, which shares code similarities in STUXNET malware. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: DUQU If your Trend Micro product
issued by Microsoft. In particular, this bulletin replaces MS11-087, which was implicated in DUQU malware in 2011. Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2,Windows
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder