Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
Organizations are struggling with how to more quickly account for and guard against zero-day vulnerabilities, reports Karen Epper Hoffman.
Kevin Mitnick's new venture will develop and procure zero-day exploits, then sell them for $100,000 or more.
FireEye researchers say that two zero-day flaws were used in separate, unrelated attacks.
Bloomberg revealed that hackers used two zero-day flaws to breach NASDAQ's servers in 2010.
News of POODLE broke this week and dominated headlines. Oracle and Microsoft issued patches, and researches discovered various ongoing attacks. For a closer look at these articles, click here to visit our news section.
The number of infections for a malvertising campaign originating on an adult website rose by 1500 percent in a two-day period.
A group of cybercriminals believed to be Russian are exploiting a zero-day vulnerability to deliver malware and gather information from various organizations around the world.
FireEye discovered that the zero-day exploit was already being used in targeted attacks, specifically aimed at IE 9 through IE 11.
The zero-day vulnerability is a remote code execution flaw in Word 2010.
An IE8 zero-day vulnerability reported to Microsoft in October 2013 has still not been patched, and could be putting hundreds of millions of users at risk.
Hackers exploited a zero-day vulnerability and gained access to sensitive information from JPMorgan Chase and at least four other financial institutions, reports indicate.
Attackers exploiting a bug in the Slider Revolution plugin to compromise WordPress websites with malware may also be targeting zero-day vulnerabilities in Firefox and Internet Explorer 11.
This month's news briefs includ revelations at the RSA Conference 2014 in San Francisco, new malware, zero-day fixes and more security news.
The use-after-free vulnerability was being exploited in drive-by-download attacks, Adobe warned.
The security update resolves an integer underflow vulnerability, which could allow an attacker to remotely take over systems on Windows, Mac and Linux platforms.
According to FireEye, the flaw was being actively exploited to target foreign policy and defense organizations.
Microsoft will be delivering five updates on upcoming Patch Tuesday, two of which are deemed critical, which means the vulnerabilities can be exploited to allow for code execution without any user interaction.
Adobe said it is aware of reports that an exploit for the bug exists.
Organizations continue to face the ongoing challenges of securing a continually evolving network perimeter. Organized crime has shifted to the digital underworld.
TrapX was alerted to the zero-day attack when the malware targeted servers with "finance" in their host names.
Sign up to our newsletters
SC Magazine Articles
- 'Sexy Girls' wallpaper app in Google Play store accessed account info
- Zeus variant targeting Canadian banks, U.S. banks may also be a target
- New attack uses ransomware to drop trojans and keyloggers
- 'GHOST' bug in Linux library enables remote takeover of victim's system
- Firm finds link between Regin spy tool and QWERTY keylogger
- Report: From Q3 to Q4, 90 percent increase in global DDoS attacks observed
- Researchers observe databases being encrypted, websites held for ransom
- ZeroAccess botnet reactivates, click fraud activity resumes
- BCBS of Tennessee shares personal data on 80K in marketing campaign
- Tips for organizations in the wake of the biggest corporate hack in history