OWASP top ten – Boring security that pays off

OWASP recently published a draft list of the top 10 security vulnerabilities of 2017. While intended for developers seeking to code more secure applications, the top 10 list is based on actual survey data of threats seen in the wild and serves as a great starting point for organizations struggling with security priorities. Let’s take a look and see how long they’ve been around prior to publication.

Read more

What is a zero day?

You have probably heard the term zero-day or zero-hour malware, but what exactly does it mean?

Read more

Tor Browser zero-day strikes again

A new zero-day has been found in the wild and was used against the popular Tor Browser. This exploit was meant to leak information about users, such as their IP address.

Read more

Botched Flash 0day Gets Patched

Exploit Kit authors implement new Flash exploit that was an actual 0day.

Read more

Recent Flash Zero-Day Now Part of Exploit Kits

Exploit kits have added the latest Flash Player exploits to their arsenal.

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language