#zero-day-exploits

[ follow ]
#cybersecurity
fromDatabreaches
4 months ago
Information security

Clop ransomware claims responsibility for Cleo data theft attacks

The Clop ransomware gang utilized zero-day exploits to attack Cleo and steal sensitive data.
fromThe Hacker News
2 days ago
Marketing tech

Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More

Cybercriminals now employ easy-to-use AI tools that lower the skill barrier for attacks.
Even small targets are at risk due to advanced fake identities and insider tactics.
Fast response is critical as waiting allows attackers to gain an advantage.
fromTheregister
3 months ago
Information security

FortiGate config leaks: Victims' email addresses published

Thousands of email addresses from leaked FortiGate configs highlight organizations potentially impacted by previous zero-day exploits.
fromTechRepublic
4 weeks ago
Apple

Apple Patches Critical Vulnerabilities in iOS 15 and 16

Apple has released security updates addressing three zero-day vulnerabilities in older operating systems, protecting against sophisticated attacks.
fromTechCrunch
1 day ago
Privacy technologies

Government hackers are leading the use of attributed zero-days, Google says | TechCrunch

Government-backed hackers are responsible for most zero-day exploits in cyberattacks, indicating a significant trend in malicious cyber activities.
fromDatabreaches
4 months ago
Information security

Clop ransomware claims responsibility for Cleo data theft attacks

The Clop ransomware gang utilized zero-day exploits to attack Cleo and steal sensitive data.
fromThe Hacker News
2 days ago
Marketing tech

Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More

Cybercriminals now employ easy-to-use AI tools that lower the skill barrier for attacks.
Even small targets are at risk due to advanced fake identities and insider tactics.
Fast response is critical as waiting allows attackers to gain an advantage.
fromTheregister
3 months ago
Information security

FortiGate config leaks: Victims' email addresses published

Thousands of email addresses from leaked FortiGate configs highlight organizations potentially impacted by previous zero-day exploits.
fromTechRepublic
4 weeks ago
Apple

Apple Patches Critical Vulnerabilities in iOS 15 and 16

Apple has released security updates addressing three zero-day vulnerabilities in older operating systems, protecting against sophisticated attacks.
fromTechCrunch
1 day ago
Privacy technologies

Government hackers are leading the use of attributed zero-days, Google says | TechCrunch

Government-backed hackers are responsible for most zero-day exploits in cyberattacks, indicating a significant trend in malicious cyber activities.
more#cybersecurity
[ Load more ]