Su | Mo | Tu | We | Th | Fr | Sa |
---|---|---|---|---|---|---|
Su | Mo | Tu | We | Th | Fr | Sa |
---|---|---|---|---|---|---|
Now the threat level for CVE-2024-38112 has become even more serious, with the publication of a new report from Trend Micro, which reports on active attacks that it says have exploited this trick in waking up Internet Explorer.
"It's going to be a wild ride because there's just so much at stake and there's a lot of animosity going on between the two sides, unfortunately," Jon Clay, vice president of threat intelligence for the cybersecurity company Trend Micro, said during an interview at this year's RSA Conference in San Francisco.
“To evolve security organizations to embrace more closely DevSecOps culture by building satellite security positions in product teams and designate developers with security roles for effective operation, patch management, and incident response,” Jon Clay, vice president for threat intelligence at Trend Micro, told Industrial Cyber.
Even showing such exploits without any accompanying details runs the risk of directing attackers to rediscover vulnerabilities, says Dustin Childs, head of threat awareness for the Zero Day Initiative at Trend Micro, which runs the Pwn2Own competition.
The cybersecurity company is looking to protect against future AI risk.