https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8655/android-mediaserver-vulnerability-cve20153823
Trend Micro researchers discovered this vulnerability in Android devices that could potentially allow attackers to perform Denial of Service (DoS) attacks once...
threat encyclopediatrend microandroidmediaservervulnerability
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/iot.linux.mirai.dlex
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to...
threat encyclopediatrend microiotlinuxmirai
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/fareit
FAREIT was discovered in 2012 and has been undergoing changes to bypass anti-virus detection. It is now one of the most successful information stealers...
threat encyclopediatrend microus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/lnk_stuxnet.c
This is the Trend Micro detection for shortcut files that attempts to exploit a vulnerablity in Windows Shell that could allow arbitrary commands to be...
threat encyclopediatrend microlnkstuxnetus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/coinminer.unix.malxmr.aa
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
threat encyclopediatrend microunixaaus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/pe_fujacks.rc
This is a file infected by PE_FUJACKS.RC-O and PE_FUJACKS.
threat encyclopediatrend microrcus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/Backdoor.Linux.MIRAI.VWIPT
This new Mirai variant uses a total of 13 different exploits, almost all of which have been used in previous Mirai-related attacks. It has backdoor and...
threat encyclopediatrend microbackdoorlinuxmirai
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8983/24-057-december-10-2024
* indicates a new version of an existing ruleDeep Packet Inspection Rules:Ivanti Endpoint Manager1012214 - Ivanti Endpoint Manager SQL Injection...
threat encyclopediatrend microdecemberus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/coinminer.ps1.malxmr.ae
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
threat encyclopediatrend microaeus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom_locky.puy
This ransomware is delivered via the Magnitude exploit kit exploiting the Adobe Flash Player vulnerability CVE-2016-1019.To get a one-glance comprehensive view...
threat encyclopediatrend microransomlockypuy
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.w97m.jascrex.bsub
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.However, as of...
threat encyclopediatrend microtrojanus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/network/ddi-rule-5406
This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host...
threat encyclopediatrend microddiruleus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/plugx
PLUGX is a remote access tool (RAT) used in targeted attacks aimed toward government-related institutions and key industries. It was utilized the same way as...
threat encyclopediatrend microus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_pidief.asr
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the...
threat encyclopediatrend microtrojasrus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/tspy_zbot.aaa
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
threat encyclopediatrend microtspyzbotaaa
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/js_rovnix.d
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other...
threat encyclopediatrend microjsus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_fakeav.fgz
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.
threat encyclopediatrend microtrojus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.w97m.powload.amq
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
threat encyclopediatrend microtrojanamqus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/worm_palevo.kk
This malware has received attention from independent media sources and/or other security firms.To get a one-glance comprehensive view of the behavior of this...
threat encyclopediatrend microwormkkus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/coinminer.linux.malxmr.uweiu
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses the...
threat encyclopediatrend microlinuxus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_pidief.aal
This Trojan has received attention from independent media sources and/or other security firms.To get a one-glance comprehensive view of the behavior of this...
threat encyclopediatrend microtrojaalus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/pua.win64.pchunter.a
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting...
threat encyclopediatrend micropuaus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_wmshell.a
This malware is involved in the DRIDEX malspam campaign that was spotted in early November 2014. It purports itself as a word document with malicious macro...
threat encyclopediatrend microtrojus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/7858/may-2018-microsoft-releases-security-patches
Microsoft addresses vulnerabilities in its May security bulletin. Trend Micro Deep Security covers the following: CVE-2018-8174 - Windows VBScript Engine...
security patchesthreat encyclopediatrend micromaymicrosoft
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/worm_sality.rl
Trend Micro has flagged this file infector as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. To get a...
threat encyclopediatrend microwormsalityrl
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom_apocalypse.a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
threat encyclopediatrend microransomapocalypseus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojanspy.python.cybervolk.thloibd
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
threat encyclopediatrend micropythonus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/backdoor.win32.devilshadow.theaabo
Cybercriminals take advantage of the popularity of the Zoom messaging app. This backdoor is found in a fake Zoom installer.
threat encyclopediatrend microbackdoorus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/andromeda
This malware family refers to variants consisting of backdoors that are tied to the ANDROMEDA botnet. The botnet was first spotted in late 2011.
threat encyclopediatrend microandromedaus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/bkdr_remosh.smf
The malware dropper, detected as BKDR_REMOSH.SML is responsible for assigning what service name the malware will use by querying certain registry entry to...
threat encyclopediatrend microbkdrsmfus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/androidos_arpush.hrxv
This is the Trend Micro detection for malicious apps that have information theft routines.This adware may be manually installed by a user.
threat encyclopediatrend microandroidosus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/network/ddi-rule-5492
This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host...
threat encyclopediatrend microddiruleus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/worm_downad.kk
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
threat encyclopediatrend microwormkkus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/7672/microsoft-internet-explorer-memory-corruption-vulnerability-cve-2016-7202
Microsoft Internet Explorer is prone to a memory corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the...
microsoft internet explorermemory corruptionvulnerabilitycvethreat
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/java_dloader.acjd
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted...
threat encyclopediatrend microjavaus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/9112/25041-october-7-2025?utm_source=feedly
* indicates a new version of an existing ruleDeep Packet Inspection Rules:DCERPC Services - Client1012456 - Microsoft Windows SMB Client Remote Code Execution...
threat encyclopediatrend microoctoberus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.win32.blueroh.rpf
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to...
threat encyclopediatrend microtrojanrpfus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/spam/515/enders-game-news-leads-to-blackhole-exploit-kit
The movie Ender's Game, based on a novel of the same name, did not escape cybercriminals' sights. Trend Micro researchers spotted Blackhole Exploit Kit spam...
blackhole exploit kitgame newsenderleadsthreat
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/worm_qbot.bud
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded...
threat encyclopediatrend microwormqbotbud
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/bkdr_mevade.b
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
threat encyclopediatrend microbkdrus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/pua_installcore.gax
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting...
threat encyclopediatrend micropuainstallcoregax
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.linux.xbash.ac
This Ransomware may be downloaded by other malware/grayware/spyware from remote sites.
threat encyclopediatrend microransomlinuxac
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/741/ms10053-cumulative-security-update-for-internet-explorer-2183461
This security update resolves six vulnerabilities in Internet Explorer that were reported privately. The most serious vulnerabilities may allow remote code...
security updateinternet explorercumulativethreat
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_netbot.s
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
threat encyclopediatrend microtrojnetbotus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/spam/3697/spammers-use-covid19-to-spread-lemon-duck-cryptominer
While the pandemic continues to affect millions of lives, spammers have continued to use COVID-19 as subject to lure recipients. In a campaign we have observed...
lemon duckspammersusecovidspread
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/pua.win32.prochack.a
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting...
threat encyclopediatrend micropuaus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/pe_virlock.f-o
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.However,...
threat encyclopediatrend microfus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/backdoor.win64.cobeacon.zamd
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to...
threat encyclopediatrend microbackdoorus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trickbot
Trickbot is a banking trojan used in attacks usually against small- and medium-sized businesses. It is designed to access online accounts, especially bank...
threat encyclopediatrend microtrickbotus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojanspy.win32.banrap.as
This Trojan Spy may be dropped by other malware.It attempts to steal information, such as user names and passwords, used when logging into certain banking or...
threat encyclopediatrend microus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_cribit.b
This threat, dubbed as BitCrypt, is a ransomware that steals funds from various cryptocurrency wallets. To get a one-glance comprehensive view of the behavior...
threat encyclopediatrend microtrojbus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/swf_angzia.a
This malware exploits an Adobe Flash zero-day vulnerability. When a system is exploited successfully, it allows a remote user to execute arbitrary code on the...
threat encyclopediatrend microswfus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/rtkt_stuxnet.a
This is Trend Micro's detection for the SYS files dropped by WORM_STUXNET.A.
threat encyclopediatrend microstuxnetus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/pua
This is the Trend Micro generic detection for potentially unwanted applications (PUAs) that are installed in your computers or devices. This application is...
threat encyclopediatrend micropuaus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/spam/3568/scammers-plague-2015-tax-season
We recently received phishing mails that take advantage of the 2015 tax season in the United States as a social engineering lure to target unwitting users. The...
tax seasonthreat encyclopediatrend microscammersplague
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/spam/259/spam-uses-ministry-of-finance-and-bank-of-philippine-islands-as-baits
Trend Micro received a sample email notification supposedly from the Federal Ministry of Finance of Malaysia. In the said message, recipients are informed that...
philippine islandsspamusesministryfinance
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/9139/25-049-december-2-2025
* indicates a new version of an existing ruleDeep Packet Inspection Rules:CyberPanel1012377* - CyberPanel Command Injection Vulnerability...
threat encyclopediatrend microdecemberus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8983/24057-december-10-2024
* indicates a new version of an existing ruleDeep Packet Inspection Rules:Ivanti Endpoint Manager1012214 - Ivanti Endpoint Manager SQL Injection...
threat encyclopediatrend microdecemberus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/bkdr_androm.bwa
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes...
threat encyclopediatrend microbkdrbwaus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ddos_ducau.a
This is the Trend Micro detection for a hacking tool that can be used to launch a denial of service attack by exploiting the Remote Desktop Protocol...
threat encyclopediatrend microddosus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_pidief.yyxg
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the...
threat encyclopediatrend microtrojus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/spam/228/black-friday-spammed-message-offers-bogus-discounts
Black Friday is one of the highly anticipated events in the United States, specifically among online shoppers, as it offers great discounts for popular items....
black fridaythreat encyclopediaspammedmessageoffers
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/coinminer.win32.malxmr.tiaoodci
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
threat encyclopediatrend microus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_fakesys
FAKEAV variants arrive on systems via compromised websites, spammed malicious links; poisoned search results that lead to FAKEAV download pages, malicious...
threat encyclopediatrend microtrojus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.x97m.cve20170199.bg
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have...
threat encyclopediatrend microtrojanbgus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/network/ddi-rule-5629
This is Trend Micro detection for TCP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host...
threat encyclopediatrend microddiruleus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/androidos_fake.dq
This Android malware poses as the Farm Frenzy game to lure users into downloading its copy on their Android-based phones.To get a one-glance comprehensive view...
threat encyclopediatrend microandroidosfakedq
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojanspy.msil.exmatter.c
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.However, as...
threat encyclopediatrend micromsilus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/html_koobface
KOOBFACE malware are known for targeting the social networking site Facebook to spread via infected wall posts. It was first spotted in 2008, but KOOBFACE was...
threat encyclopediatrend microhtmlkoobfaceus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/Trojan.VBS.MALXMR.THHADBO
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
threat encyclopediatrend microtrojanvbsus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/network/ddi-rule-4878
This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host...
threat encyclopediatrend microddiruleus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/fakeav
FAKEAV variants arrive on systems via compromised websites, spammed malicious links; poisoned search results that lead to FAKEAV download pages, malicious...
threat encyclopediatrend microus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/TrojanSpy.MSIL.XWORM.RGN
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes...
threat encyclopediatrend micromsilrgnus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/bkdr_wipall.a
This backdoor contains a list of user names and passwords which it uses in its attempt to grant access to the System Root folder of an infected machine. It...
threat encyclopediatrend microbkdrus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.js.avaddon.yjaf-a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the...
threat encyclopediatrend microtrojanjsavaddon
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8935/24-042-september-10-2024
* indicates a new version of an existing ruleDeep Packet Inspection Rules:Web Client Common1012141 - Microsoft Windows MSHTML Platform Spoofing Vulnerability...
threat encyclopediatrend microseptemberus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.win64.redlinestealer.n
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be...
threat encyclopediatrend microtrojanus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_fraudpac.ql
This Trojan has received attention from independent media sources and/or other security firms.To get a one-glance comprehensive view of the behavior of this...
threat encyclopediatrend microtrojqlus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_dloade.fbv
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses Windows...
threat encyclopediatrend microtrojfbvus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/spam/3558/torrentlocker-takes-advantage-of-2015-tax-season
TorrentLocker takes advantage of the 2015 tax season in the ANZ region. Trend Micro researchers found a spammed message that lures users by using penalty tax...
takes advantagetax seasonthreat encyclopediatorrentlockertrend
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/1873/unspecified-vulnerability-in-the-java-runtime-environment
Unspecified vulnerability in theJava Runtime Environment component in Oracle Java SE JDK and JRE allows remote untrusted Java Web Start applications and...
java runtime environmentthreat encyclopediaunspecifiedvulnerabilitytrend
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_duqu.aa
This Trojan arrives as a component bundled with malware/grayware packages.It requires its main component to successfully perform its intended routine.
threat encyclopediatrend microtrojduquaa
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.macos.fake3l3ctron.a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
threat encyclopediatrend microtrojanmacosus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/3641/may-2015-microsoft-releases-13-security-advisories
Microsoft addresses the following vulnerabilities in its May batch of patches for 2015: (MS15-043) Cumulative Security Update for Internet Explorer (3049563)...
security advisoriesthreat encyclopediamaymicrosoftreleases
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_sasfis.bt
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
threat encyclopediatrend microtrojbtus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/backdoor.linux.kinsing.a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not...
threat encyclopediatrend microbackdoorlinuxus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/poisonivy
POISONIVY, also known as POISON, is a popular Remote Administration Tool (RAT) backdoor available in the underground market. It has been in circulation for...
threat encyclopediatrend micropoisonivyus
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/spam/3502/blackhole-exploit-kit-comes-with-upatre-trojan
Carelessly opening attachments may cause your computer unwanted malware infection. As observed by Trend Micro researchers in 2013, Blackhole Exploit...
blackhole exploit kitthreat encyclopediacomestrojantrend
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/2632/remote-desktop-protocol-vulnerability-cve20120002
The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2,...
remote desktop protocolthreat encyclopediavulnerabilitycvetrend
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/worm_mydoom.smb
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.
threat encyclopediatrend microwormmydoomsmb
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.vbs.dropper.r
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
threat encyclopediatrend microtrojanvbsdropper
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/network/ddi-rule-5083
This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host...
threat encyclopediatrend microddiruleus