The Fancybox plugin for WordPress has been hit by a zero-day exploit that allows hackers to inject malicious code into websites, reports ZDNet.
Search results for: "zero-day"
A zero day vulnerability in Flash is being actively used by cybercriminals, according to Forbes.
Microsoft to fix zero‑day flaw that meant just previewing an Outlook email could infect your computer
It's one thing to have a security hole that relies upon users visiting an infected website, or opening a dodgy attachment - but it's quite a different level of threat when simply *previewing* a message in your email client infects your computer.
Microsoft releases a fix for a zero-day vulnerability that has already been exploited by hackers in targeted attacks against some organisations. Don't delay!
Researchers have demonstrated an attack that completely bypasses the protections offered by EMET - a Microsoft toolkit used to provide safeguards against zero-day attacks, according to Ars Technica.
Some traffic has crossed my radar concerning a 0-day exploit that apparently enables a remote attacker to crash a Vista or Windows 7 system with SMB enabled (and according to subsequent reports, Server 2008). The original post and exploit are claimed to demonstrate the possibility of a Blue Screen Of Death (BSOD) and (normally) an automatic reboot when
NOD32 now detects attempts to exploit the Excel vulnerability announced June 16th. This means that even if an attacker tries to use the exploit to download a virus or trojan that no product in the world detects, NOD32 will prevent the vulnerability from being exploited. No download means no threat to NOD32 users. NOD32 is
ESET researchers look at malware that abuses vulnerabilities in kernel drivers and outline mitigation techniques against this type of exploitation
ESET researchers have discovered strategic web compromise (aka watering hole) attacks against high‑profile websites in the Middle East
While Apple did issue a patch for the vulnerability, it seems that the fix can be easily circumvented
Misconfigurations of cloud resources can lead to various security incidents and ultimately cost your organization dearly. Here’s what you can do to prevent cloud configuration conundrums.
A new paper explains how ransomware has become one of the top cyberthreats of the day and how your organization can avoid becoming the next victim
How can companies and employees who start to adapt to hybrid working practices protect themselves against cloud security threats?
The latest Patch Tuesday brings a new batch of security updates addressing a total of 117 vulnerabilities
Lessons to learn from the Kaseya cyberincident to protect your business' data when doing business with a MSP.
What does the increasingly fuzzy line between traditional cybercrime and attacks attributed to state-backed groups mean for the future of the threat landscape?
You, too, may be vulnerable to SIM swap attacks – How to defend yourself against rom-cons – Zero day in macOS allowed malware to take secret screenshots
The attack is a reminder of growing cyberthreats to critical infrastructure while also showing why providers of essential services are ripe targets for cybercriminals