Get Permission
Supermicro and Pulse Secure have each issued advisories this past week warning users that some of their products are vulnerable to the updated version of Trickbot malware that features a bootkit module, nicknamed Trickboot, which can search for UEFI/BIOS firmware vulnerabilities.
Server maker Supermicro confirmed that its X10UP Denlow series of motherboards has vulnerabilities that can be detected by Trickboot. Secure access gateway manufacturer PulseSecure notes that two of its Pulse Secure Appliance models can be exploited. Supermicro is aware of the Trickboot issue which is observed only with a subset of the X10 UP motherboards, the company says, adding it will be providing a patch. It did not, however, offer a time frame for when the patch would be issued.
Supermicro and PulseSecure Issue Advisories on Trickboot
govinfosecurity.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from govinfosecurity.com Daily Mail and Mail on Sunday newspapers.
Detected cyber threats rose 20% to exceed 62,6bn
it-online.co.za - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from it-online.co.za Daily Mail and Mail on Sunday newspapers.
Share this article
Share this article
DALLAS, Feb. 23, 2021 /PRNewswire/ Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced it detected 119,000 cyber threats per minute in 2020 as home workers and infrastructure came under new pressure from attacks. This insight and many others come from Trend Micro s 2020 roundup report,
(PRNewsfoto/Trend Micro Incorporated)
The report also shows that home networks were a major draw last year for cybercriminals looking to pivot to corporate systems, or compromise and conscript IoT devices into botnets. Trend Micro found attacks on homes surged 210% to reach nearly 2.9 billion amounting to 15.5% of all homes. The vast majority (73%) of attacks on home networks involved brute forcing logins to gain control of a router or smart device.