zero-Day

FireEye discovered a new zero-day exploit for IE in the wild – Operation Clandestine Fox

FireEye Research Labs has identified a new IE zero-day vulnerability exploited in a series of targeted attacks part of the…

12 years ago

Reading the Mandiant M-Trends 2014 Threat Report

Mandiant has released its annual M-Trends 2014 Threat Report, a document that analyzes actors, means and motivations behind attacks observed…

12 years ago

Symantec Internet Security Threat Report on evolution of cyber menaces

Symantec has issued The Internet Security Threat Report, a document which provides an overview and analysis of global threat evolution…

12 years ago

WinRAR zero-day exploited in cyber espionage campaign

Israeli researcher Danor Cohen has discovered a security flaw in WinRAR, IntelCrawler confirmed was exploited in cyber espionage campaign. WinRAR is…

12 years ago

Evolution of the offer in the underground market

RAND nonprofit and Juniper Networks firm published an interesting research on the evolution of the offer in the underground market.…

12 years ago

Another zero-day vulnerability is threatening the Microsoft world

Microsoft issued a security advisory for the presence of a zero-day vulnerability in Microsoft Word products which allows a remote…

12 years ago

Linux Operation Windigo hit 500000 PC and 25000 dedicated servers

Antivirus Firm ESET has been tracking and investigating the operation behind Linux_Ebury uncovering a sophisticated campaign called Operation Windigo. Operation…

12 years ago

Nearly 7600 critical infrastructure vulnerable to bugs in Yokogawa App

Security experts at Rapid7 firm have public disclosed a series of flaws affecting several thousands of critical infrastructure using Yokogawa…

12 years ago

FireEye 2013 Advanced Threat Report on APTs campaigns

FireEye issued the 2013 Advanced Threat Report, the study provides a high-level overview of the computer network attacks by APTs…

12 years ago

Secunia analyzed vulnerabilities in the Top 50 portfolio products

Secunia's Vulnerability Review 2014 provides an interesting analysis of the number of vulnerabilities in the Top 50 portfolio products. The…

12 years ago

This website uses cookies.