Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


9.8 Severity and Counting: Inside Trend Micro’s Latest Security Emergency
Manage episode 488555244 series 3645080
In this episode, we break down Trend Micro’s urgent June 10th security update that patched ten high- and critical-severity vulnerabilities—some with CVSSv3.1 scores as high as 9.8—across Apex Central and Endpoint Encryption PolicyServer (TMEE). While no active exploitation has been observed, the risks are too severe to ignore.
We spotlight the most dangerous issues: pre-authentication remote code execution vulnerabilities stemming from insecure deserialization, a critical authentication bypass that allows attackers full admin access, and SQL injection flaws that enable privilege escalation. Apex Central and TMEE users running vulnerable versions could face full system compromise if left unpatched.
We’ll explain what deserialization means, why insecure deserialization is so dangerous, how attackers could exploit these bugs, and why immediate patching is non-negotiable. We also explore mitigation strategies including updated intrusion prevention filters, secure coding practices, and why perimeter security and monitoring matter more than ever—even if no exploitation has been spotted (yet).
Tune in for a deep dive into one of the year’s most critical coordinated vulnerability disclosures—and make sure your systems aren’t left exposed.
237 episodes
Manage episode 488555244 series 3645080
In this episode, we break down Trend Micro’s urgent June 10th security update that patched ten high- and critical-severity vulnerabilities—some with CVSSv3.1 scores as high as 9.8—across Apex Central and Endpoint Encryption PolicyServer (TMEE). While no active exploitation has been observed, the risks are too severe to ignore.
We spotlight the most dangerous issues: pre-authentication remote code execution vulnerabilities stemming from insecure deserialization, a critical authentication bypass that allows attackers full admin access, and SQL injection flaws that enable privilege escalation. Apex Central and TMEE users running vulnerable versions could face full system compromise if left unpatched.
We’ll explain what deserialization means, why insecure deserialization is so dangerous, how attackers could exploit these bugs, and why immediate patching is non-negotiable. We also explore mitigation strategies including updated intrusion prevention filters, secure coding practices, and why perimeter security and monitoring matter more than ever—even if no exploitation has been spotted (yet).
Tune in for a deep dive into one of the year’s most critical coordinated vulnerability disclosures—and make sure your systems aren’t left exposed.
237 episodes
All episodes
×
1 Koske Malware Hides in Panda Images, Weaponizes AI to Target Linux 44:03

1 Operation Checkmate: BlackSuit Ransomware’s Dark Web Sites Seized 39:19

1 Coyote Malware Exploits Microsoft UI Automation in First-Ever Wild Attack 34:14

1 No Fix Coming: Remote Code Execution Flaw in 1,300 LG Security Cameras 31:12

1 ToolShell Exploited: China-Linked Hackers Breach NNSA and U.S. Government Networks 1:14:36

1 Massive NPM Breach: Malicious Packages Spread via Compromised Maintainer Accounts 41:44

1 Clorox Sues Cognizant Over $356M Cyberattack: Who's Really to Blame? 44:38

1 HeroDevs Secures $125M to Extend Life of Critical Open Source Software 35:36

1 UK Moves to Ban Ransomware Payments for Public Sector and Critical Infrastructure 48:22

1 New SysAid Vulnerabilities Added to CISA’s KEV List: XXE Flaws Could Enable RCE 26:10

1 Lumma Stealer Returns: Malware-as-a-Service Resurges After Global Takedown 44:16

1 Cisco ISE Critical Flaws Now Actively Exploited: No Workarounds, Just Root Access 37:32

1 ToolShell: SharePoint Zero-Day Chain Gives Hackers Full Remote Access 58:23

1 CVE-2025-54309: CrushFTP Zero-Day Exploited in Global Admin Access Attacks 22:13

1 Dell Breach by World Leaks: Extortion Attempt Hits Demo Platform 23:49

1 Critical VPN Vulnerability: ExpressVPN Exposed IPs via RDP Misrouting 59:16

1 Dior Data Breach Exposes U.S. Customer Info in LVMH Vendor Attack 41:11

1 StrongestLayer Raises $5.2M to Fight AI-Powered Phishing with TRACE 52:49

1 750,000 Records Exposed: Inside the TADTS Data Breach by BianLian 1:03:29

1 SS7 Is Still Broken: How Surveillance Firms Are Bypassing Telco Defenses 50:12

1 The UNFI Cyberattack: How Hackers Disrupted the U.S. Food Supply Chain 23:30

1 Zuckerberg on Trial: The $8 Billion Data Privacy Reckoning 21:28

1 Operation Eastwood: Inside the Takedown of NoName057(16) 21:17

1 Phished and Exposed: What the Co-op Hack Reveals About Retail Cybersecurity 21:37

1 FileFix Attacks Are Here: How Interlock’s Ransomware is Skipping Your Defenses 21:52

1 Ontinue Uncovers SVG-Based Phishing: Why Your Browser Could Be the Weak Link 23:58

1 Exein Raises €70M: Defending the IoT-AI Frontier with Embedded Security 17:35

1 Salt Typhoon Strikes Again: National Guard, Telecoms, and a Crisis in U.S. Cyber Defense 21:58

1 DragonForce Ransomware Hits Belk: 150GB Data Leak and Operational Chaos 1:20:33

1 NVIDIA Issues Urgent Rowhammer Warning: Enable ECC or Risk AI Integrity 40:39

1 Zip Security Secures $13.5M to Simplify and Scale Cyber Defense 48:43

1 Century Support Services Breach: 160,000 Identities Compromised in Silent Cyberattack 32:03

1 TikTok, China, and the EU: The Battle Over Data Sovereignty 58:06

1 Booz Allen Invests in Corsha: Defending Machine-to-Machine Communication at Scale 33:00

1 WSUS Meltdown: Global Sync Failures and the Shift Toward Cloud Patch Management 27:45

1 Cracking eSIM: Exposing the Hidden Threats in Next-Gen Mobile Security 16:43

1 Qantas Breach and Beyond: Cybersecurity Risks in Australia’s Digital Supply Chains 1:03:23

1 Taiwan Sounds the Alarm: TikTok, WeChat, and the Chinese Data Threat 1:06:28

1 The Evolution of Atomic macOS Stealer: Backdoors, Keyloggers, and Persistent Threats 45:00

1 CitrixBleed Returns: CVE-2025-5777 and the Exploitation of NetScaler Devices 1:02:21

1 SAP’s July 2025 Patch Day: Critical Flaws, CVE-2025-30012, and Ransomware Risk 1:02:01

1 106GB Exposed? Telefónica, HellCat, and the Silent Data Breach 50:33

1 Ingram Micro’s SafePay Ransomware Breach: Human-Operated Threats and Supply Chain Fallout 59:56

1 The Illusion of Shutdowns: What Hunters International's Closure Really Means 42:41

1 CISA Flags CVE-2025-6554: Patching Chrome’s Critical Flaw Before It’s Too Late 40:49
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.