zero-day vulnerabilities

0patch releases unofficial security patches for 3 Windows flaws yet to be fixed

Researchers from 0patch, a community of experts that aims at addressing software flaws, released unofficial patches for three Windows vulnerabilities that…

5 years ago

Critical Infrastructure security, is it possible a shared regulatory?

Reflession on the necessity to adopt a shared regulatory for the security of critical infrastructure. Eugene Kaspersky point of view…

10 years ago

NSA Bullrun program, encryption and false perception of security

Revelations on Bullrun program demonstrated that NSA has capabilities against widely-used online protocols such as HTTPS and encryption standards. The…

11 years ago

Zero-day market, the governments are the main buyers

Governments, and in particular US one, are principal buyers of zero-day vulnerabilities according a report published by Reuters. Zero-days exploits…

11 years ago

First APT attack on Android targeted Tibetan & Uyghur activists

Read about APT attacks has become customary, even easier to hear of attacks against political dissidents or minorities as Tibetan…

11 years ago

Java exploit signed with certificate stolen to Bit9

According security experts the numerous cyber attacks that hit principal IT companies, news agencies and government offices exploited zero-day vulnerabilities…

11 years ago

New Zero-Day Vulnerabilities affect Java earlier versions

Java, Java and once again Java, the popular framework and its vulnerabilities are becoming a really nightmare for security experts,…

11 years ago

Threat Report H2 2012 proposed by F-Secure

Today the principal channel for malware diffusion is considered internet, large diffusion of exploit kits and crimeware such as BlackHole,…

11 years ago

SCADA and critical infrastructures, in … security

According last report published by The European Network and Information Security Agency (ENISA)   “ENISA Threat Landscape – Responding to the…

11 years ago

Proactive defense, humans or machines … that’s the question

  Governments all around the world are committed for the definition of a proper cyber strategy that represents an optimum…

11 years ago

This website uses cookies.