Tag Trend Micro

Microsoft Releases Security Update Addressing 118 Vulnerabilities, Including Two Under Active Exploitation

Microsoft has announced the release of security updates addressing 118 vulnerabilities in its software suite, two of which have been identified as actively exploited vulnerabilities in the wild. Among these vulnerabilities, three have been classified as Critical, while 113 are rated Important, and two are deemed Moderate. Notably, this Patch…

Read MoreMicrosoft Releases Security Update Addressing 118 Vulnerabilities, Including Two Under Active Exploitation

DarkRadiation Ransomware: A Wormable Threat to Linux and Docker Environments

Cybersecurity experts have alerted the public to a new ransomware variant identified as “DarkRadiation,” which operates entirely within Bash. This strain specifically targets Linux and Docker cloud environments, utilizing the messaging platform Telegram for its command-and-control communications. According to Trend Micro’s latest report, DarkRadiation is crafted in Bash and aims…

Read MoreDarkRadiation Ransomware: A Wormable Threat to Linux and Docker Environments

Unfixed Windows Vulnerability Paves the Way for State-Sponsored Cyber Hackers

Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime Chinese Hackers Exploit Windows Vulnerability Against European Diplomats Akshaya Asokan (asokan_akshaya) , David Perera (@daveperera) • November 5, 2025     Image: AR Pictures/Shutterstock Security researchers have reported that Chinese nation-state hackers are actively using a Windows vulnerability to target European…

Read MoreUnfixed Windows Vulnerability Paves the Way for State-Sponsored Cyber Hackers

Cybercriminals Target Docker API Servers for SRBMiner Crypto Mining Attacks

Recent investigations by Trend Micro have revealed a targeted attack focusing on Docker remote API servers, where malicious actors are deploying the SRBMiner cryptocurrency miner on compromised instances. These findings underscore an alarming trend in cyberattacks utilizing the burgeoning popularity of containerized services. The analysis indicates that the attackers leveraged…

Read MoreCybercriminals Target Docker API Servers for SRBMiner Crypto Mining Attacks

APT Hackers Spread Android Trojan Through Syrian e-Government Portal

A sophisticated threat actor has been identified in a recent campaign utilizing Android malware disseminated through the Syrian e-Government Web Portal. This marks a significant evolution in the actor’s toolkit, reflecting an enhanced capability to exploit vulnerabilities for malicious purposes. According to researchers from Trend Micro—Zhengyu Dong, Fyodor Yarochkin, and…

Read MoreAPT Hackers Spread Android Trojan Through Syrian e-Government Portal

Two Windows Vulnerabilities, Including a Zero-Day, Actively Exploited

Researchers have identified that two critical vulnerabilities in Windows operating systems are currently being exploited in widespread cyberattacks. One of these vulnerabilities is a zero-day flaw that has remained active since 2017, while the second is a significant bug that Microsoft has struggled to patch effectively. The zero-day vulnerability was…

Read MoreTwo Windows Vulnerabilities, Including a Zero-Day, Actively Exploited

Microsoft Addresses 90 New Vulnerabilities, Including Actively Exploited NTLM and Task Scheduler Issues

On November 12, 2024, Microsoft disclosed that two significant security vulnerabilities affecting Windows NT LAN Manager (NTLM) and Task Scheduler have been actively exploited in the wild. These vulnerabilities were part of the November Patch Tuesday update, which addressed a total of 90 security flaws across Microsoft products. Among the…

Read MoreMicrosoft Addresses 90 New Vulnerabilities, Including Actively Exploited NTLM and Task Scheduler Issues

Ngioweb Botnet Powers NSOCKS Residential Proxy Network by Targeting IoT Devices

Recent investigations by Lumen Technologies have unveiled the significant role of the Ngioweb malware in powering the well-known residential proxy service NSOCKS, along with related services such as VN5Socks and Shopsocks5. This revelation highlights the ongoing misuse of this malware in various cybercriminal operations. The telemetry data from Black Lotus…

Read MoreNgioweb Botnet Powers NSOCKS Residential Proxy Network by Targeting IoT Devices

DataBreachToday: Infostealers on the Loose

Cybercrime, Fraud Management & Cybercrime, Identity & Access Management Malware Captures Billions of Credentials Mathew J. Schwartz (euroinfosec) • October 24, 2025 Image: Shutterstock Credential theft via infostealers has escalated to alarming levels, as cybercriminals continuously adapt to enhanced security measures. By infiltrating corporate systems with malware that captures session…

Read MoreDataBreachToday: Infostealers on the Loose