ThreatCluster
About Blog Help Contact
Login
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

Trend Micro warns of Apex One zero-day exploited in attacks

Threat Score:
54
BleepingComputer
3 days ago
Part of cluster #1704
Trend Micro warns of Apex One zero-day exploited in attacks

Overview

Trend Micro warns of Apex One zero-day exploited in attacks Sergiu Gatlan August 6, 2025 06:06 AM 0 Trend Micro has warned customers to immediately secure their systems against an actively exploited remote code execution vulnerability in its Apex One endpoint security platform. Apex Oneis an endpoint security platform designed to automatically detect and respond to threats, including malicious tools, malware, and vulnerabilities. This critical security flaw (tracked asCVE-2025-54948andCVE-2025-5...

Continue Reading on Original Site

Related Articles

5 articles
1
Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Brighttalk • 4 hours ago

Presented by Jitin Shabadu, Forrester Analyst | Jayce Nichols, Director, Intelligence Solutions, Google Threat Intelligence Group

Score
83
Read more
2

WinRAR Zero-Day CVE-2025-8088 Exploited to Spread RomCom Malware

Hackread • 4 hours ago

Critical WinRAR flaw CVE-2025-8088 exploited by Russia-linked hackers to spread RomCom malware, update to version 7.13 now to…

Score
82
Read more
3

Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems

The Hacker News • 3 hours ago

Cybersecurity researchers have uncovered a jailbreak technique to bypass ethical guardrails erected by OpenAI in its latest large language model (LLM) GPT-5 and produce illicit instructions. Generative artificial intelligence (AI) security platform NeuralTrust said it combined a known technique called Echo Chamber with narrative-driven steering to trick the model into producing undesirable responses. "We use Echo Chamber to seed and reinforce a subtly poisonous conversational context, then guide

Score
77
Read more
4
Multiple Zero-Day Exploits Discover That Bypass BitLocker, Exposing All Encrypted Data

Multiple Zero-Day Exploits Discover That Bypass BitLocker, Exposing All Encrypted Data

GB Hackers • 8 hours ago

Multiple Zero-Day Exploits Discover That Bypass BitLocker, Exposing All Encrypted Data Microsoft security researchers have uncovered four critical vulnerabilities inWindows BitLockerthat could allow attackers with physical access to bypass the encryption system and extract sensitive data. The findings, revealed in research dubbed “BitUnlocker,” demonstrate sophisticated attack methods targeting the Windows Recovery Environment (WinRE) to circumvent Microsoft’s flagship data protection technology

Score
75
Read more
5

CastleBot MaaS Released Diverse Payloads in Coordinated Mass Ransomware Attacks

GB Hackers • 11 hours ago

CastleBot MaaS Released Diverse Payloads in Coordinated Mass Ransomware Attacks IBM X-Force has uncovered CastleBot, a nascent malware framework operating as a Malware-as-a-Service (MaaS) platform, enabling cybercriminals to deploy a spectrum of payloads ranging from infostealers to sophisticated backdoors implicated in ransomware operations. First detected in early 2025 with heightened activity since May, CastleBot facilitates the delivery of threats likeNetSupportand WarmCookie, which have his

Score
73
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

CVES
CVE-2022-40139
CVE-2023-41179
CVE-2025-54948
CVE-2025-54987
ATTACK TYPES
Command Injection
Remote Code Execution
VULNERABILITIES
Authentication Bypass
Command Injection
RCE
Remote Code Execution
Zero-Day
COMPANIES
Cisco
Trend Micro
AGENCIES
CERT
CISA
Japanese CERT
SECURITY VENDORS
Trend Micro
RANSOMWARE
One
MITRE ATT&CK
T1040
T1043
T1053
T1059.001
T1059.003
PLATFORMS
Apex One
Windows
INDUSTRIES
Cybersecurity
Information Technology
COUNTRIES
Japan
ARTICLE INFORMATION
Article #9140
Published 3 days ago
BleepingComputer

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration