With the new Am I Affected button, IBM QRadar users are quickly notified of any indicators of a zero-day vulnerability captured within X-Force Exchange collections.
The best way to remediate zero-day threats is to focus on proactively assessing and patching the vulnerabilities that facilitate them.
It took fraudsters less than 24 hours after the disclosure of a previously unknown Apache Struts 2 vulnerability to develop a Python script to exploit it.
The increasing sophistication of cybercriminals has led to a significant surge in zero-day malware, according to a recent report.
Chrysaor, a variant of Pegasus spyware, has appeared on a small handful of Android devices and surveils users with a variety of techniques.
SAP HANA customers should invest in an active threat monitoring and detection solution — meaning a SAP-specific threat vector detection.
A zero-day vulnerability can be absolutely catastrophic for an organization. Zero-day exploits remain popular and widely available on Dark Web forums.
The cybergang known as the Shadow Brokers is allegedly peddling a new zero-day Windows exploit. Is the threat credible enough to warrant blocking SMB?
A security researcher recently discovered how zero-day exploits could be leveraged to steal private information from desktop Linux systems.
Security-focused web browser Tor was compromised by browser malware last week. Researchers also found ransomware hiding on the Tor network.