Zero-Day Exploit: A zero-day exploits is a vulnerability in a system or device that has been disclosed but is not yet patched. An exploit that attacks a zero-day vulnerability is called a zero-day exploit. Read more
From the fallout from the Hacking Team leak to the increased risks of using OS x, iOS, Android, and Flash Player, here's a look at how vulnerabilities shaped the threat landscape so far this year—and what to expect for the second half of 2015.
A lot has happened since the surveillance software company Hacking Team got hacked last week. Here's a quick rundown of updates on the zero-day vulnerabilities that was found following the HT data dump.
A surveillance software company gets breached, exposing files that include an exploit for a zero-day. Several exploit kits have been updated to include the exploit that affects all versions of Adobe Flash player.
We noticed a problematic pattern developing: the increasing use of exploit kits in malvertising. Zero-day exploits are now deployed in malicious ads, instead of first being used in targeted attacks against enterprises and other organizations.
Trend Micro researchers found that the recently discovered Adobe Flash player zero-day vulnerability is being abused by malware advertisements used by a top video-sharing site, among other sites. Update: Adobe has released an update that addresses this vulnera
We typically expect to see at least three to four zero-day vulnerabilities a year. October 2014 is proving to be an exception to the rule as three zero-day vulnerabilities have already been exploited within the month.
A recent investigation revealed that the Sandworm zero day exploit could likely be used to target GE Intelligent Platform CIMPLICITY users. Find out what it does and how you can safeguard your systems against this emerging attack.