It took fraudsters less than 24 hours after the disclosure of a previously unknown Apache Struts 2 vulnerability to develop a Python script to exploit it.
The increasing sophistication of cybercriminals has led to a significant surge in zero-day malware, according to a recent report.
Chrysaor, a variant of Pegasus spyware, has appeared on a small handful of Android devices and surveils users with a variety of techniques.
SAP HANA customers should invest in an active threat monitoring and detection solution — meaning a SAP-specific threat vector detection.
A zero-day vulnerability can be absolutely catastrophic for an organization. Zero-day exploits remain popular and widely available on Dark Web forums.
The cybergang known as the Shadow Brokers is allegedly peddling a new zero-day Windows exploit. Is the threat credible enough to warrant blocking SMB?
A security researcher recently discovered how zero-day exploits could be leveraged to steal private information from desktop Linux systems.
Security-focused web browser Tor was compromised by browser malware last week. Researchers also found ransomware hiding on the Tor network.
Instead of concentrating on zero-day threats, security teams should focus on preventing common, simple attacks to solve complex security issues.
Recent security research found that cybercriminals may be taking their zero-day exploits to the open malware market, peddling them to the highest bidder.