About
Mission
We connect journalism, community building and posting to feed society with reliable data and create equal development opportunities.
Vision
We are building a future where transparency, social cohesion and flexible talent combine to create impactful, data-driven decision-making.
About
De onderzoekers van Ko'W' Checking zijn professionals van het AgapeUnit team die zich richten op onafhankelijke, data gedreven berichtgeving. Via onze eigen platform bieden wij de samenleving betrouwbare en feitelijk onderbouwde informatie, gebaseerd op zorgvuldig onderzoek en verificatie. Ko'W' Checking werkt met een eigen redactie en onderzoeksstructuur. Informatie wordt uitsluitend gepubliceerd na interne controle. Indien nodig corrigeren wij ook berichten afkomstig van andere nieuwsbronnen wanneer deze onjuist blijken te zijn. Wij aanvaarden op dit moment nog geen externe sponsoring of financiering. Dit is een bewuste keuze, zodat wij volledig onafhankelijk kunnen opereren; zonder binding aan commerciële of politieke belangen. Transparantie, integriteit en controleerbare feiten staan bij ons centraal.

Trend Micro warns of exploitation of Apex One vulnerabilities, Suriname-based cyber security company Avigdor advises

Trend Micro recently disclosed a series of critical security vulnerabilities in the on-premises version of its Apex One Management Console. These are two related vulnerabilities (CVE-2025-54948 and CVE-2025-54987), both of which carry a CVSS score of 9.4. A command injection in the management console allows an attacker to upload and execute malicious code on affected systems without prior authentication, while the second variant specifically targets a different CPU architecture.

While details of actual attacks are not yet public, Trend Micro confirms that its Incident Response department has observed at least one active exploit attempt. The discoverers of the leaks, Trend Micro's internal IR team and CoreCloud Tech researcher Jacky Hsieh, are being praised by the company for their rapid reporting of the vulnerabilities.

For Apex One as a Service customers, mitigations are in place as early as July 31, 2025. For on-premise installations, Trend Micro offers a temporary fix program that completely blocks known exploits. However, this temporary fix restricts use of the Remote Install Agent feature in the console; alternative agent installation methods (such as via UNC path or agent package) will continue to work as normal. A final patch is expected no later than mid-August 2025.

Trend Micro emphasizes that an attacker does need physical or (authorized) remote access to a vulnerable machine to exploit the vulnerabilities. In addition to quickly applying available mitigations and the upcoming patch, the company advises organizations to thoroughly review their access policies to vital systems and strengthen perimeter security.

Cyber security company in Suriname Avigdor recommends organizations in Suriname that use on-premise Apex One e.g. government agencies, financial services companies and utilities to immediately implement the fix program and be prepared for the formal patch in August. In addition, it is advisable to investigate whether migration to the SaaS variant of Apex One or to other cloud-based security services can further enhance the continuity of their own security infrastructure. Avigdor who does advanced penetrating testing for companies in Suriname says that all IT infrastructure needs to be audited more often these days because attacks are increasingly sophisticated and faster, especially now with AI.

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Related Posts
Surinaamse vlag Agape Unit Surinaamse vlag Agape Unit Surinaamse vlag Agape Unit Surinaamse vlag Agape Unit Surinaamse vlag Agape Unit Surinaamse vlag Surinaamse vlag Agape Unit Surinaamse vlag Agape Unit Surinaamse vlag Agape Unit Surinaamse vlag Agape Unit Surinaamse vlag Agape Unit Surinaamse vlag