Windows 10 patching process may leave enterprises vulnerable to zero‑day attacks
Aryeh Goretsky considers how the Windows 10 patching process might affect both the enterprise and the home user.
Aryeh Goretsky considers how the Windows 10 patching process might affect both the enterprise and the home user.
The Fancybox plugin for WordPress has been hit by a zero-day exploit that allows hackers to inject malicious code into websites, reports ZDNet.
A zero day vulnerability in Flash is being actively used by cybercriminals, according to Forbes.
It's one thing to have a security hole that relies upon users visiting an infected website, or opening a dodgy attachment - but it's quite a different level of threat when simply *previewing* a message in your email client infects your computer.
Microsoft releases a fix for a zero-day vulnerability that has already been exploited by hackers in targeted attacks against some organisations. Don't delay!
Researchers have demonstrated an attack that completely bypasses the protections offered by EMET - a Microsoft toolkit used to provide safeguards against zero-day attacks, according to Ars Technica.
Audio: /us/resources/podcasts/092112_ESET_Java.mp3
Some traffic has crossed my radar concerning a 0-day exploit that apparently enables a remote attacker to crash a Vista or Windows 7 system with SMB enabled (and according to subsequent reports, Server 2008). The original post and exploit are claimed to demonstrate the possibility of a Blue Screen Of Death (BSOD) and (normally) an automatic reboot when
Audio: /us/resources/podcasts/090607_ESET_Yahoo_Messenger_Bug.mp3
NOD32 now detects attempts to exploit the Excel vulnerability announced June 16th. This means that even if an attacker tries to use the exploit to download a virus or trojan that no product in the world detects, NOD32 will prevent the vulnerability from being exploited. No download means no threat to NOD32 users. NOD32 is
ESET Research uncovered a campaign by APT group Tick against a data-loss prevention company in East Asia and found a previously unreported tool used by the group
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T2 2022
The news seems awash this week with reports of both Microsoft and Apple scrambling to patch security flaws in their products
Previously unknown macOS malware uses cloud storage as its C&C channel and to exfiltrate documents, keystrokes, and screen captures from compromised Macs
War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture
Organizations need to get better at mitigating threats from unknown vulnerabilities, especially as both state-backed operatives and financially-motivated cybercriminals are increasing their activity
Why has the conflict in Ukraine not caused the much anticipated global cyber-meltdown?
ESET researchers look at malware that abuses vulnerabilities in kernel drivers and outline mitigation techniques against this type of exploitation
ESET researchers have discovered strategic web compromise (aka watering hole) attacks against high‑profile websites in the Middle East
While Apple did issue a patch for the vulnerability, it seems that the fix can be easily circumvented