HP Wolf Security threat research team sees cybercriminals using legitimate cloud providers to host malware, and switching up file and script types to evade detection tools...
Zero-day vulnerabilities are among the deadliest threats leveraged by attackers to accomplish their malicious attacks. Everyone is aware of the damage caused by the recent ProxyLogon zero-day attacks....
Cybersecurity firm Qualys is likely the latest victim to have suffered a data breach after a zero-day vulnerability in their Accellion FTA server was exploited to steal...
Networking device vendor SonicWall has released the findings of an initial investigation after zero-day vulnerabilities in its products were targeted in a ‘highly sophisticated’ hack. The company, which...
The LPE bug could allow an attacker to install programs; view, change, or delete data; or create new accounts with full user rights. A high-severity Windows...
Threat actors exploit zero-day threats to make an impact before the organizations get a chance to patch them. Recent zero-day attacks In recent months, several well-known...
Recent Comments