Tag "Zero Day"

Back to homepage

Sophisticated threats? It’s usually the basic ones that get you

To listen to the headlines, the threats we face today are so sophisticated and intense, they can only be evaded with the help of artificial intelligence and machine learning. Losing


46,000 new phishing sites are created every day

An average of 1.385 million new, unique phishing sites are created each month, with a high of 2.3 million sites created in May. The data collected by Webroot shows today’s


Cybercriminals deploying assortment of banking Trojans and ransomware

Check Point revealed that banking trojans were extensively used by cybercriminals during August, with three variants appearing in the company’s latest Global Threat Impact Index.The Zeus, Ramnit and Trickbot banking

Identity Theft

The Value Of An Open Approach When Defending Against Attacks – Information Security Buzz

The latest HBO hack and leaked episodes of Game of Thrones shone a spotlight on the need for protecting proprietary data. For every new encryption or password management point solution


User-targeted threats at all-time high despite rising education spend – Help Net Security

The cost of security education for large enterprises at an all-time-high of $290,033 per year per organization, and user education is rocketing up the CIO’s priority list. Yet despite those


Billions of mobile, desktop and IoT devices exposed to BlueBorne AttackSecurity Affairs

Billions of mobile, desktop and IoT devices that use Bluetooth may be exposed to a new remote attack, even without any user interaction and pairing. The unique condition for BlueBorne


From zero-day exploits to rampant ‘ransomware’: how advanced targeted attacks evolved in Q2, 2017 – IT SECURITY GURU

The second quarter of 2017 saw sophisticated threat actors unleash a wealth of new and enhanced malicious tools, including three zero-day exploits and two unprecedented attacks: WannaCry and ExPetr. Expert

Industry Insights

Rising information security threats, and what to do about them – Help Net Security

The digital threat landscape faced by enterprises large and small is in perpetual flux, and keeping an eye on things and adapting defenses should be of primary importance to every

Identity Theft

Attackers have no need of zero-days, breach data shows

Cyber attackers do not have to use previously unseen or extremely sophisticated attacks to bypass defences, analysis of publicly reported breaches in the past year reveals Most successful cyber attacks


Zero-Day Malware Poses a Growing Threat

For much of the general public, including the enterprise world, security protection is synonymous with antivirus software. Security professionals, by contrast, have long understood that this applied to only one