#zero-day-vulnerabilities

[ follow ]
Information security
fromComputerworld
3 days ago

Google warns of two actively exploited Chrome zero days

Critical Chromium browser vulnerabilities with active exploitation require immediate updates across all Chromium-based browsers to prevent drive-by attacks.
fromTheregister
3 days ago

Google rushes Chrome update to fix zero-days under attack

CVE-2026-3909 is an out-of-bounds write flaw in Skia, the graphics library Chrome uses to render web content and parts of its user interface. Memory corruption bugs like this can sometimes be abused by attackers to crash applications or run their own code if successfully exploited.
Information security
fromSecurityWeek
3 days ago

Chrome 146 Update Patches Two Exploited Zero-Days

Google is aware that exploits for both CVE-2026-3909 & CVE-2026-3910 exist in the wild. CVE-2026-3909 is described as an out-of-bounds write defect in the Skia graphics library. It could be triggered via malicious HTML pages to corrupt memory, which could lead to arbitrary code execution or crashes.
Information security
Games
fromZero Day Initiative
4 days ago

Zero Day Initiative - Announcing Pwn2Own Berlin for 2026

Pwn2Own returns to Berlin in 2026 with expanded AI categories, AWS co-sponsorship, over $1,000,000 in prizes, and 31 targets across 10 categories including browsers, containers, servers, virtualization, and operating systems.
fromThe Hacker News
5 days ago

Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days

This month, over half (55%) of all Patch Tuesday CVEs were privilege escalation bugs, and of those, six were rated exploitation more likely across Windows Graphics Component, Windows Accessibility Infrastructure, Windows Kernel, Windows SMB Server, and Winlogon. We know these bugs are typically used by threat actors as part of post-compromise activity, once they get onto systems through other means (social engineering, exploitation of another vulnerability).
Information security
fromArs Technica
1 week ago

Feds take notice of iOS vulnerabilities exploited under mysterious circumstances

How this proliferation occurred is unclear, but suggests an active market for 'second hand' zero-day exploits. Beyond these identified exploits, multiple threat actors have now acquired advanced exploitation techniques that can be re-used and modified with newly identified vulnerabilities.
Information security
Information security
fromTechzine Global
1 week ago

China and spyware companies dominate zero-day attacks

Zero-day vulnerability exploits reached 90 cases in 2025, with Chinese cyber espionage groups and commercial spyware companies driving attacks increasingly toward enterprise infrastructure and security equipment.
#enterprise-security
fromTechCrunch
1 week ago
Information security

Google says half of all zero-days it tracked in 2025 targeted buggy enterprise tech | TechCrunch

Information security
fromTechCrunch
1 week ago

Google says half of all zero-days it tracked in 2025 targeted buggy enterprise tech | TechCrunch

Nearly half of tracked zero-day vulnerabilities in 2024 targeted enterprise devices, with security infrastructure like firewalls and VPNs being primary targets for hackers seeking corporate data access.
fromComputerWeekly.com
1 week ago

Spyware suppliers exploit more zero-days than nation states | Computer Weekly

Historically, traditional state-sponsored cyber espionage groups have been the most prolific attributed users of zero-day vulnerabilities. [But] over the last few years, the increase of zero-day exploitation attributed to CSVs and their customers has demonstrated the growing ability of these vendors to provide zero-day access to a wider range of threat actors than ever before.
Information security
Information security
fromThe Hacker News
2 weeks ago

Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

Multiple attack vectors across network systems, cloud infrastructure, and AI platforms exploit access control gaps, exposed credentials, and trusted service misuse to target high-value sectors.
Information security
fromSecurityWeek
2 weeks ago

US Sanctions Russian Exploit Broker Operation Zero

The US government sanctioned seven individuals and entities for acquiring and distributing cyber exploits, including a Russian broker who paid $1.3 million for stolen zero-day exploits intended for government use.
#microsoft-security-updates
fromFortune
1 month ago

Anthropic's newest model excels at finding security vulnerabilities, but raises cybersecurity risks | Fortune

According to a report from the company's Frontier Red Team, during testing, Opus 4.6 identified over 500 previously unknown zero-day vulnerabilities-flaws that are unknown to people who wrote the software, or the party responsible for patching or fixing it-across open-source software libraries. Notably, the model was not explicitly told to search for the security flaws, but rather it detected and flagged the issues on its own.
Information security
Artificial intelligence
fromInfoWorld
1 month ago

Claude AI finds 500 high-severity software vulnerabilities

Claude Opus 4.6 uncovered 500 high-severity zero-day vulnerabilities in open-source projects while running in a VM with standard analysis tools and no guidance.
fromTheregister
1 month ago

Automotive systems get pwned at Pwn2Own Automotive 2026

infosec in brief T'was a dark few days for automotive software systems last week, as the third annual Pwn2Own Automotive competition uncovered 76 unique zero-day vulnerabilities in targets ranging from Tesla infotainment to EV chargers. A record 73 entries were included in this year's competition at Automotive World in Tokyo, and, while not all were successful, Trend Micro's Zero Day Initiative still ended up paying out more than $1 million to successful competitors. For those unfamiliar with the structure of a Pwn2Own competition, ethical hackers and security experts enter with plans to perform a certain exploit, which they must do in a limited time.
#microsoft-patch-tuesday
fromThe Hacker News
2 months ago

China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines

Chinese-speaking threat actors are suspected to have leveraged a compromised SonicWall VPN appliance as an initial access vector to deploy a VMware ESXi exploit that may have been developed as far back as February 2024. Cybersecurity firm Huntress, which observed the activity in December 2025 and stopped it before it could progress to the final stage, said it may have resulted in a ransomware attack.
Information security
Apple
fromTheregister
3 months ago

Apple and Google forced into emergency patching 0-day

Apple and Google issued emergency patches for zero-day vulnerabilities actively exploited in sophisticated, targeted attacks.
Information security
fromThe Hacker News
3 months ago

Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw

Update Chrome immediately to patch a high-severity, actively exploited vulnerability and multiple other zero-day and medium-severity flaws.
Information security
fromComputerworld
3 months ago

More work for admins as Google patches latest zero-day Chrome vulnerability

Zero-day Chrome vulnerabilities force enterprises to rush manual patches within days, disrupting regular eight-week ESC testing and causing significant operational strain.
Information security
fromDataBreaches.Net
5 months ago

CISA Emergency Directive 25-03: Identify and Mitigate Potential Compromise of Cisco Devices - DataBreaches.Net

Critical Cisco ASA zero-day vulnerabilities enable unauthenticated remote code execution and ROM persistence; agencies must immediately mitigate, assess compromise, and remediate ASA and Firepower devices.
Information security
fromThe Hacker News
5 months ago

Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware

Threat actors exploited Cisco ASA zero-day vulnerabilities to deploy advanced RayInitiator and LINE VIPER malware, bypassing protections and achieving persistence.
#cybersecurity
Tech industry
fromTheregister
10 months ago

75 zero-days exploited in 2024 with focus on enterprise tech

Zero-day vulnerabilities are still a prime target for attackers, showing a trend despite fewer reported exploits in 2024.
Tech industry
fromTheregister
10 months ago

75 zero-days exploited in 2024 with focus on enterprise tech

Zero-day vulnerabilities are still a prime target for attackers, showing a trend despite fewer reported exploits in 2024.
fromZDNET
7 months ago

Microsoft fixes two SharePoint zero-days under attack, but it's not over - how to patch

CVE-2025-53771 is a SharePoint Server spoofing vulnerability allowing attackers to impersonate trusted users or resources, while CVE-2025-53770 permits remote code execution.
Privacy professionals
Privacy technologies
fromZDNET
9 months ago

Qualcomm patches three exploited security flaws, but you could still be vulnerable

Qualcomm has patched three critical zero-day security vulnerabilities related to its Adreno GPU driver, indicating ongoing exploitation risks.
DevOps
fromComputerWeekly.com
10 months ago

May Patch Tuesday brings five exploited zero-days to fix | Computer Weekly

Microsoft has released fixes for five zero-day vulnerabilities rated as Important severity, actively exploited in the wild.
#apple
Apple
fromTechRepublic
10 months ago

Apple Patches Two Zero-Days Used in 'Extremely Sophisticated' Attacks

Apple addressed critical security vulnerabilities to protect devices from targeted attacks.
The vulnerabilities exploited sophisticated attacks against specific individuals, indicating possible government involvement.
Apple
fromComputerworld
10 months ago

You need to update your Apple devices immediately

Apple's latest security patch addresses urgent zero-day vulnerabilities amidst rising digital chaos and insecurity.
[ Load more ]