zero-Day

Why do we need for Incident Response plan?

Due to the constant growth in the number of cyber attacks it is necessary to properly define the actions composing…

12 years ago

Cyberespionage – Chinese Hackers targeting US Cloud service providers

U.S.-China Economic and Security Review Commission reported for the first time that cloud computing “represents a potential espionage threat.” U.S.-China…

12 years ago

Jboss Application Server flaw exploit allows web shell code injection

Imperva experts detected a surge in the exploitation of Jboss Application Server as result of the public disclosure of an…

12 years ago

MS Silverlight 5 flaw exposes 40M Netflix users to security risk

Users of Netflix, the provider of on-demand Internet streaming media, must beware of Silverlight exploit that could allow attackers to…

12 years ago

Adobe security breach,hackers steal 2.9M accounts and source code

Adobe reveals customer data stolen in security breach, hackers have accessed sensitive information for 2.9 million users and to the…

12 years ago

Android Firefox Zero-Day exploit available on the underground

A researcher at Malwarebytes has discovered that a Russian hacker recently released an Android Firefox Zero-Day exploits on the underground.…

12 years ago

Poison Ivy still alive, old malware new cyber threats – FireEye report

Security vendor FireEye has published a detailed analysis on the popular Poison Ivy RAT, releasing also a set of tools…

12 years ago

Kaspersky Lab experts detected most sophisticated Android trojan

Security researchers at Kaspersky Lab detected a new instance of Android trojan, dubbed Obad, that they have judged as the most…

13 years ago

Google data breach, Company’s Surveillance Database hacked

Chinese hackers who breached Google in 2010 are responsible for the recent violation to Google Company’s Surveillance Database according officials…

13 years ago

Zero-day market, the governments are the main buyers

Governments, and in particular US one, are principal buyers of zero-day vulnerabilities according a report published by Reuters. Zero-days exploits…

13 years ago

This website uses cookies.