Tag "Zero Day"

Back to homepage
Industry Insights Software

New systems, new cyber threats

Threat actors constantly remain one step ahead of those seeking to prevent malicious attacks. As the oil and gas industry migrates sensitive business data to the cloud and increasingly adopts

Software

BlueKeep Attacks Have Arrived, Are Initially Underwhelming

The first attacks that exploit the zero-day Windows vulnerability install cryptominers and scan for targets rather than a worm with WannaCry potential.The wave of BlueKeep attacks that security experts predicted could take

Industry Insights Vendor News

Microsoft: Russia Again Hacks Anti-Doping and Sports Agencies

Facing possible exclusion from the 2020 Summer Olympics in Tokyo and other major athletic events, Russia once again has been attempting to hack anti-doping agencies and sports organizations, Microsoft reported yesterday. Click

Software

New Firefox Privacy Protections, Apple iOS Zero-Days, Facebook User Phone Numbers Exposed

You’re listening to the Shared Security Podcast, exploring the trust you put in people, apps, and technology…with your host, Tom Eston. In episode 85 for September 9th 2019: Firefox will

Industry Insights

Why startups need to start caring more about cybersecurity

In the midst of business chaos and the dream to become a unicorn, startups, most often than not, tend to ignore cybersecurity. But a cybersecurity-oriented approach is critical to safeguard

Software

Zero-day attack: An attack that can spread faster than defenders can react

A zero-day vulnerability is a weakness within a computer network or software program that is unknown to the developers.  The term ‘zero-day’ indicates that the developers do not get any

Software

Businesses need to rethink security priorities due to shifting trends

One shift in attacks that businesses should be aware of is the rapid growth of cryptocurrency mining, which increased 237 percent, according to the 2018 Security Roundup Report by Trend Micro. Overall,

Software

Chrome Zero-Day Exploited to Harvest User Data via PDF Files

Exploit detection service EdgeSpot says it has spotted several PDF documents that exploit a zero-day vulnerability in Chrome to collect information on users who open the files through Google’s web

Software

Zero-day vulnerability in ‘Total Donations’ plugin could allow attackers to take over WordPress sites

The zero-day affects all versions of Total Donations plugin, a commercial plugin that is used to gather and manage donations. The plugin’s code contains several design flaws that inherently expose

Hardware/Network

Major flaws uncovered in leading IoT protocols

Trend Micro warned organizations to revisit their operational technology (OT) security after finding major design flaws and vulnerable implementations related to two popular machine-to-machine (M2M) protocols, Message Queuing Telemetry Transport