Trend Micro Security Predictions for 2019
Common Information
Type | Value |
---|---|
UUID | fe48d24f-87b5-4772-8f55-46518a808c19 |
Fingerprint | 37008d99d1d9e575056fd46aa3c77ea72acbea399c12c2d42c703ed4bfeee4ac |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Nov. 20, 2019, 10:34 a.m. |
Added to db | April 14, 2024, 10:41 a.m. |
Last updated | Aug. 30, 2024, 10:48 p.m. |
Headline | Trend Micro Security Predictions for 2019 |
Title | Trend Micro Security Predictions for 2019 |
Detected Hints/Tags/Attributes | 179/4/76 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 197 | cve-2019-0708 |
|
Details | CVE | 15 | cve-2019-1181 |
|
Details | CVE | 23 | cve-2019-5736 |
|
Details | Domain | 245 | shutterstock.com |
|
Details | Domain | 138 | www.securityweek.com |
|
Details | Domain | 175 | www.zdnet.com |
|
Details | Domain | 604 | www.trendmicro.com |
|
Details | Domain | 35 | www.europol.europa.eu |
|
Details | Domain | 170 | support.apple.com |
|
Details | Domain | 20 | www.pwc.com |
|
Details | Domain | 54 | www.csoonline.com |
|
Details | Domain | 4 | ai.googleblog.com |
|
Details | Domain | 177 | blog.trendmicro.com |
|
Details | Domain | 34 | msrc-blog.microsoft.com |
|
Details | Domain | 55 | cwe.mitre.org |
|
Details | Domain | 10 | www.brookings.edu |
|
Details | Domain | 35 | blackhat.com |
|
Details | Domain | 29 | www.cnet.com |
|
Details | Domain | 101 | www.theregister.co.uk |
|
Details | Domain | 360 | attack.mitre.org |
|
Details | File | 2 | open-banking.html |
|
Details | File | 3 | iocta2018.pdf |
|
Details | File | 252 | www.cs |
|
Details | File | 3 | deepfake-videos-how-and-why-they-work.html |
|
Details | File | 3 | contributing-data-to-deepfake-detection.html |
|
Details | File | 4 | 502.html |
|
Details | File | 3 | us-19-shaik-new-vulnerabilities-in-5g-networks-wp.pdf |
|
Details | File | 674 | node.js |
|
Details | Url | 3 | https://www.zdnet.com/article/microsoft-jet-vulnerability-still-open-to-attacks-despite-recent-patch/. |
|
Details | Url | 3 | https://www.securityweek.com/cisco-improperly-patched-exploited-router-vulnerabilities. |
|
Details | Url | 3 | https://www.zdnet.com/article/security-researchers-expose-another-instance-of-chrome-patch-gapping/. |
|
Details | Url | 11 | https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital- |
|
Details | Url | 2 | https://www.europol.europa.eu/newsroom/news/cybercrime-becoming-bolder-data-centre-of-crime-scene. |
|
Details | Url | 2 | https://support.apple.com/en-gb/ht206637. |
|
Details | Url | 2 | https://www.pwc.com/it/en/industries/banking/future- |
|
Details | Url | 2 | https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/the-risks-of- |
|
Details | Url | 25 | https://www.trendmicro |
|
Details | Url | 4 | https://www.europol.europa |
|
Details | Url | 2 | https://www.justice.gov/opa/pr/281-arrested-worldwide-coordinated-international-enforcement-operation-targeting-hundreds. |
|
Details | Url | 2 | https://www.csoonline.com/article/3293002/deepfake-videos-how-and-why-they-work.html |
|
Details | Url | 4 | https://www.wsj.com/articles/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402. |
|
Details | Url | 6 | https://www.trendmicro.com/vinfo |
|
Details | Url | 3 | https://www.zdnet.com/article/forget-email-scammers-use-ceo-voice-deepfakes-to-con-workers-into-wiring-cash/. |
|
Details | Url | 3 | https://ai.googleblog.com/2019/09/contributing-data-to-deepfake-detection.html |
|
Details | Url | 26 | https://www.trendmicro.com |
|
Details | Url | 8 | https://blog.trendmicro.com/trendlabs-security-intelligence/new- |
|
Details | Url | 2 | https://www.zdnet.com/article/ransomware-hits-hundreds-of-dentist-offices-in-the-us/. |
|
Details | Url | 2 | https://msrc-blog.microsoft.com/2019/08/13/patch-new-wormable-vulnerabilities-in-remote- |
|
Details | Url | 3 | https://arstechnica.com/information-technology/2019/09/exploit-for-wormable-bluekeep-windows-bug-released-into-the-wild/. |
|
Details | Url | 2 | https://blog.trendmicro.com/trendlabs-security-intelligence/brute-force-rdp-attacks-plant-crysis-ransomware/. |
|
Details | Url | 2 | https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/samsam-ransomware-suspected-in-atlanta- |
|
Details | Url | 4 | https://cwe.mitre.org/data/definitions/502.html |
|
Details | Url | 3 | https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/virtual-patching-patch-those- |
|
Details | Url | 2 | https://www.trendmicro.com/vinfo/us/security/definition |
|
Details | Url | 15 | https://www.trendmicro.com/vinfo/us/security |
|
Details | Url | 3 | https://www.brookings.edu/research/why-5g-requires-new-approaches-to-cybersecurity/. |
|
Details | Url | 2 | https://i.blackhat.com/usa-19/wednesday/us-19-shaik-new-vulnerabilities-in-5g-networks-wp.pdf |
|
Details | Url | 3 | https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/eu-report-highlights-cybersecurity-risks-in-5g-networks. |
|
Details | Url | 7 | https://www.trendmicro.com/vinfo/us/security/news/internet-of-things |
|
Details | Url | 4 | https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/securing-the- |
|
Details | Url | 2 | https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/new-critical-infrastructure-facility-hit-by-group-behind-triton. |
|
Details | Url | 3 | https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/triton-wielding-its-trident-new- |
|
Details | Url | 3 | https://www.cnet.com/news/weworks-weak-wi-fi-security-leaves-sensitive-documents-exposed/. |
|
Details | Url | 2 | https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/cve-2019- |
|
Details | Url | 3 | https://www.gartner.com/en/newsroom/press-releases/2018-12-04-gartner-identifies-the-top-10-trends-impacting-infras. |
|
Details | Url | 3 | https://www.zdnet.com/article/what-serverless-computing-really-means-and-everything-else-you-need-to-know/. |
|
Details | Url | 3 | https://www.theregister.co.uk/2018/05/15/stale_serverless_functions/. |
|
Details | Url | 3 | https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/serverless-applications-what-they-mean-in-devops. |
|
Details | Url | 3 | https://www.forbes.com/sites/willemsundbladeurope/2019/07/18/smart-manufacturing-creating-a-hybrid-cloud-edge-strategy/#77fc5816af5a |
|
Details | Url | 2 | https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/hacker-infects-node-js-package-to-steal- |
|
Details | Url | 2 | https://www.trendmicro.com/vinfo/us/security/news/security-technology/risks-under-the-radar-understanding-fileless-threats. |
|
Details | Url | 19 | https://blog.trendmicro.com/trendlabs-security- |
|
Details | Url | 17 | https://blog.trendmicro.com |
|
Details | Url | 3 | https://blog.trendmicro.com/trendlabs-security-intelligence/emotet-distributed-ransomware-loader-for-nozelesn-found-via-managed-detection- |
|
Details | Url | 2 | https://www.zdnet.com/article/microsoft-developer-reveals-linux-is-now-more-used-on-azure-than-windows- |
|
Details | Url | 12 | https://attack.mitre.org/. |