You searched for zero day | SC Media

Your search for zero day returned 1381 results

Your search for zero day returned 1381 results

Sort Results:

Relevant Recent
Security News, Vulnerabilities

Microsoft Edge secretly whitelisted sites running Flash Player for Facebook

By
Facebook has found itself involved in another controversy, this time a cybersecurity researcher has revealed Microsoft Edge allows Flash Player content to be played on Facebook without notifying the user. Google Project Zero’s Ivan Fratric came across what is essentially a secret whitelist and reported it on November 26, 2018 and waited the usual 90 days…
Security News

77 updates in Microsoft patch Tuesday

By
Microsoft released 77 updates, 20 of which were classified as critical, in this months patch Tuesday announcement. The updates included fixes for Microsoft Windows, Office, IE, Edge resolving a total of 74 unique CVEs this month including one actively exploited zero day flaw in Internet Explorer, according to its February Patch Tuesday release. The zero…
Apple issues seven updates, fixes more than 40 vulnerabilities in iOS 8, OS 10.9.5
Mobile Security, Network Security, Security News, Vulnerabilities

Apple patches two flaws reportedly exploited in zero-day attacks; also nixes FaceTime eavesdropping bug

By
Apple yesterday released security updates for iOS and macOS Mojave, repairing four vulnerabilities, including two that a Google researcher says were exploited in the wild as zero days. The two exploited flaws consisted of memory corruption issues caused by insufficient input validation. The first, CVE-2019-7286, is a privilege escalation vulnerability in the Foundation framework that…
APTs/cyberespionage, Cybercrime, Malware, Phishing, Security News

Phishing campaign targeted subscribers to Tibetan Government-in-Exile’s mailing list

By
Subscribers to a Tibetan Government-in-Exile mailing list were targeted in a recent email-based phishing campaign designed to infect them with a remote access trojan. Dubbed ExileRAT, the trojan is capable of gathering system information, retrieving and pushing files, and executing and ending various processes, according to a blog post from Cisco Systems’ Talos division, whose…
Government/Defense, Ransomware, Security News

Who dat talkin’ about hacking the Super Bowl?

By
While the New Orleans Saints won’t be in Atlanta Sunday playing in the Super Bowl, that doesn’t mean their cheer – Who dat! – should be sidelined by security pros and fans who must be hyper-vigilant in recognizing and spurning cyberattackers. Saints fans might argue that dim-eyed refs pose the biggest threat to the game,…
Product Review

CloudPassage Halo

CloudPassage provides users with cloud security posture management, vulnerability assessment, file integrity monitoring, configuration management, host log monitoring, host admin privilege management and application control. CloudPassage Halo can be applied to any workload form factor with any deployment model. The initial deployment can be completed in hours, with expansion in days. The auto-scaling grid keeps…
Product Review

ShieldX Elastic Security Platform

ShieldX believes going beyond control is important for resiliency, and provides a dozen capabilities, including a firewall, IPSs, URL filtering and more. Customers can expect to be able to block new vectors of cloud-based attacks. ShieldX has the speed and scale to perform at the levels expected in the cloud. Full stack protection is offered…
Opinion, Security News

Double jeopardy: Data center security and the threat of cryptocurrency mining

By Liviu Arsene, senior e-threat analyst, Bitdefender Cybercrime is motivated by financial gain, be it in the form of money or data that can be monetized. Experts estimate the cybercrime industry nets trillions in illicit profits while causing significant financial and reputational damage to organizations. Organizations agree that their security risks have increased in the…
Opinion, Security News

Why modernize the enterprise security stack? Recent breaches point the way

By Fraser Kyne, EMEA CTO, Bromium Cathay Pacific, Eurostar, British Airways – it’s fair to say last October was a bit of a nightmare for security departments across the world, and for consumers. And the Marriott breach in November was equally horrific. Cathay Pacific lost the details of 9 million customers; whilst BA’s most recent…
Mobile Security, Security News

Tesla Model 3 up for grabs at CanSecWest Pwn2Own contest

By
Telsa dramatically upped the ante at the upcoming CanSecWest security conference Pwn2Own contest with the company offering up a Tesla Model 3 among other prizes to anyone who can successfully hack the vehicle. The Zero Day Initiative said a car will be on site at the conference, being held March 20-22 in Vancouver, and the…
Next post in Mobile Security