A zero-day attack exploits an unpatched vulnerability. Until a patch becomes available, it is often a race between threat actors trying to exploit the flaw and vendors or developers rolling out a patch to fix it.
Zero-Day Exploit: A zero-day exploits is a vulnerability in a system or device that has been disclosed but is not yet patched. An exploit that attacks a zero-day vulnerability is called a zero-day exploit. Read more
What happens to an unpatched or vulnerable application or organization’s IT infrastructure? Here's how virtual patching helps enterprises address vulnerability and patch management woes.
Onze veiligheidsvoorspellingen voor 2019 zijn gebaseerd op de analyse door onze experts van de voortgang van huidige en nieuwe technologieën, gebruikersgedrag, markttrends en hun invloed op het dreigingslandschap.
Onze veiligheidsvoorspellingen voor 2019 zijn gebaseerd op de analyse door onze experts van de voortgang van huidige en nieuwe technologieën, gebruikersgedrag, markttrends en hun invloed op het dreigingslandschap.
From the fallout from the Hacking Team leak to the increased risks of using OS x, iOS, Android, and Flash Player, here's a look at how vulnerabilities shaped the threat landscape so far this year—and what to expect for the second half of 2015.
A lot has happened since the surveillance software company Hacking Team got hacked last week. Here's a quick rundown of updates on the zero-day vulnerabilities that was found following the HT data dump.
A surveillance software company gets breached, exposing files that include an exploit for a zero-day. Several exploit kits have been updated to include the exploit that affects all versions of Adobe Flash player.
We noticed a problematic pattern developing: the increasing use of exploit kits in malvertising. Zero-day exploits are now deployed in malicious ads, instead of first being used in targeted attacks against enterprises and other organizations.