SUBSCRIBE
Tech Journal Now
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
Reading: Trend Micro patches critical flaws in its Apex Central software – Computerworld
Share
Tech Journal NowTech Journal Now
Font ResizerAa
  • News
  • Reviews
  • Guides
  • AI
  • Best Buy
  • Games
  • Software
Search
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
Have an existing account? Sign In
Follow US
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Tech Journal Now > Software > Trend Micro patches critical flaws in its Apex Central software – Computerworld
Software

Trend Micro patches critical flaws in its Apex Central software – Computerworld

News Room
Last updated: January 10, 2026 2:29 am
News Room
Share
2 Min Read
SHARE

Erik Avakian, technical counselor at Info-Tech Research Group, explained why this is an issue. “There’s a critical flaw in the management server in how one of its background services handles certain types of network messages that allows an attacker on the network to run their own code without logging in. That service will accept a message from anyone on the network and then can blindly load a Windows DLL using a standard Windows function. The problem is that the software doesn’t properly validate where that DLL is coming from.”

When this happens, he said, the affected software will run the attacker’s code, probably at the highest level of privilege. So, in these circumstances, the attacker can point Apex Central to a DLL that they control, for example, on a remote network. That could then move deeper into the corporate software environment. “In short, if this server is exposed and unpatched, it can be taken over remotely,” said Avakian.

What makes the attack particularly insidious, he said, is that attackers don’t need to log into the server or copy files onto it. “They simply can host a malicious DLL somewhere they control and instruct Apex Central to load it. Because of the flaw, Apex Central reaches out and loads the DLL itself, effectively pulling in and executing the attacker’s code without checking who asked.”

Read the full article here

You Might Also Like

EU looks to bolster its open-source sector to counter US cloud dominance – Computerworld

JP Morgan Chase wins the hunt for the Apple Card – Computerworld

WhatsApp gets new security features – Computerworld

India withdraws demand for forced installation of government app – Computerworld

CME Group takes a hands-on approach to talent development – Computerworld

Share This Article
Facebook Twitter Email Print
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Trending Stories

Games

Why does isometric perspective suit Disco Elysium? ‘You can design the entire game as if it was a painting’

February 4, 2026
Games

How to get a Lucky Clover in Terraria

February 4, 2026
Games

Helldivers 2’s overpowered, wildly fun tank is the culmination of two years of balancing

February 4, 2026
News

Oregon theater marquee joked about ‘Melania’ movie, and manager says Amazon pulled the film

February 3, 2026
Games

Avowed and The Outer Worlds 2 failed to meet expectations for Obsidian, but Grounded 2 was a hit, and the future is looking positive for the Pillars of Eternity universe

February 3, 2026
Games

Helldivers 2 has a tank now

February 3, 2026

Always Stay Up to Date

Subscribe to our newsletter to get our newest articles instantly!

Follow US on Social Media

Facebook Youtube Steam Twitch Unity

2024 © Prices.com LLC. All Rights Reserved.

Tech Journal Now

Quick Links

  • Privacy Policy
  • Terms of use
  • For Advertisers
  • Contact
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?