Adobe Reader zero-day discovered alongside Windows vulnerability

A new Adobe Reader zero-day exploit has been discovered, including a full sandbox escape.

Read more

Internet Explorer zero-day: browser is once again under attack

Internet Explorer is yet again leveraged for a zero-day exploit delivered via Office document—the first zero-day observed for IE in over two years.

Read more

PSA: New Microsoft Word 0day used in the wild

Read more about the latest Microsoft Word Zero-Day and how to protect yourself against it.

Read more

OWASP top ten – Boring security that pays off

OWASP recently published a draft list of the top 10 security vulnerabilities of 2017. While intended for developers seeking to code more secure applications, the top 10 list is based on actual survey data of threats seen in the wild and serves as a great starting point for organizations struggling with security priorities. Let’s take a look and see how long they’ve been around prior to publication.

Read more

What is a zero day?

You have probably heard the term zero-day or zero-hour malware, but what exactly does it mean?

Read more

Tor Browser zero-day strikes again

A new zero-day has been found in the wild and was used against the popular Tor Browser. This exploit was meant to leak information about users, such as their IP address.

Read more

Botched Flash 0day Gets Patched

Exploit Kit authors implement new Flash exploit that was an actual 0day.

Read more

Recent Flash Zero-Day Now Part of Exploit Kits

Exploit kits have added the latest Flash Player exploits to their arsenal.

Read more

New Flash Player Zero-Day in The Wild (updated)

A new Flash Player zero-day has been found in the wild and is being used in targeted attacks. Adobe has published a security bulletin and released a patch now.

Read more

DYLD_PRINT_TO_FILE exploit found in the wild

Last month, Stefan Esser blogged about a zero-day vulnerability in OS X, without having informed Apple about the problem first. Unfortunately, today has brought the discovery of the first known exploit.

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language