Quantcast

Latest Zero day attack Stories

2014-08-11 12:31:42

LONDON, August 11, 2014 /PRNewswire/ -- The "Epic" operation serves as the first phase in a multi-stage infection of the Turla campaign Turla, also known as Snake or Uroburos is one of the most sophisticated ongoing cyber-espionage campaigns. When the first research on Turla/Snake/Uroburos was published, it didn't answer one major question: how do victims become infected? The latest Kaspersky Lab research on this operation reveals that Epic is the initial stage...

FireEye Discovers Widespread Zero-Day Exploit In Internet Explorer
2014-04-28 07:03:01

Lawrence LeBlond for redOrbit.com - Your Universe Online After a web security firm identified and revealed a zero-day exploit in Internet Explorer over the weekend, Microsoft announced that it is actively investigating the vulnerability and will take “appropriate action” once it completes that investigation. FireEye Research Labs on Saturday identified a zero-day exploit that affects IE6 through IE11 – the attack, however, only targeted IE9 through IE11. “Microsoft has assigned...

2014-04-03 08:37:33

Key findings shed light on cybercriminal services, emerging threat ecosystem and key stages for attack interception SAN DIEGO, April 3, 2014 /PRNewswire/ -- Websense, Inc., the global leader in protecting organizations from advanced cyber attacks and data theft, today released the Websense® Security Labs(TM) 2014 Threat Report, documenting the latest shift in complex attack trends, evolution in the threat ecosystem and shifting motivation of cyber-attacks. "Cybercriminals continue to evolve...

Pwn2Own competition results
2014-03-15 06:19:02

redOrbit Staff & Wire Reports - Your Universe Online All four of the major Internet browsers were among the programs that fell victim to zero-day exploits during the HP-sponsored Pwn2Own hacking competition, various media outlets reported earlier this week. According to CNET’s Seth Rosenblatt, Apple Safari, Google Chrome, Microsoft Internet Explorer, Mozilla Firefox and Adobe’s Flash and Reader browser plug-ins were programs cracked by eight research teams participating in the...

Attack On US Veterans Website May Have Targeted Military Personnel
2014-02-14 10:34:29

Peter Suciu for redOrbit.com - Your Universe Online On Tuesday security researchers identified a zero-day exploit (CVE-2014-0322) that had been served up from the US Veterans of Foreign Wars (VFW) website. This attack reportedly targeted American military personnel during this week’s paralyzing snowstorm at the United States Capitol. Researchers at FireEye believe that those behind this attack, which may have also been coordinated to take place in advance of the Presidents' Day...

2014-02-11 08:39:48

Utilizes Innovative Techniques to Provide Industry's Most Up-to-date Protection for Advanced Email-Borne Threats NEW YORK, Feb. 11, 2014 /PRNewswire/ -- SilverSky, the leading independent provider of cloud-based managed security services, today announced the launch of its Targeted Attack Prevention (TAP) solution. TAP will help customers better prepare for and prevent today's more sophisticated threats, including targeted attacks, zero-day attacks and advanced persistent threats...

2014-01-15 23:04:02

Trammell Ventures, a business incubator and think tank specializing in information security, announced today the purchase of the remaining interest of ExploitHub from NSS Labs, Inc. Austin, TX (PRWEB) January 15, 2014 Trammell Ventures, a business incubator and think tank specializing in information security, announced today the purchase of the remaining interest of ExploitHub from NSS Labs, Inc. ExploitHub was previously a joint venture between Trammell Ventures and NSS Labs. ExploitHub...

New UMich Formula Predicts Perfect Moment For Hackers To Strike
2014-01-15 09:50:01

[ Watch the Video: New Model For Predicting Cyberattacks ] Brett Smith for redOrbit.com - Your Universe Online The timing of a cyber-attack is crucial to overcoming measures designed to defend or repel the attacks and a new study from researchers at the University of Michigan has revealed a mathematical model that could be used to optimize the timing of would-be hackers. In the study, which was published in the Proceedings of the National Academy of Sciences (PNAS), the research team...

2013-11-16 23:02:23

When a zero-day exploit is successfully leveraged by hackers, the consequences can have far reaching effects, especially when they targeted flaw is in a popular program like Microsoft’s Internet Explorer browser, like the ones just recently patched. Unlike traditional antimalware solutions, the new Data Breach Response Toolkit (DBRT) by Global Digital Forensics gives IT security personnel the ability to identify and remediate threats like these without relying on an already known and...

Microsoft Windows Vista Vulnerable To Zero-Day Attacks
2013-11-06 14:15:22

Peter Suciu for redOrbit.com - Your Universe Online Microsoft Windows Vista was far from a hit with users when it debuted worldwide in 2007, but now the operating system might have another reason to be seriously disliked. The OS could open users to attacks by hackers. On Tuesday Microsoft warned its customers of a so-called zero-day vulnerability that apparently targets the older versions of Microsoft Windows as well as Microsoft Office. So far, attacks have been reported in the Middle...


Word of the Day
pungle
  • To take pains; labor assiduously with little progress.
This word comes from the Spanish 'pongale,' put it.
Related