#zero-day-exploits

[ follow ]
#cybersecurity
fromTechCrunch
3 months ago
Privacy technologies

Government hackers are leading the use of attributed zero-days, Google says | TechCrunch

fromThe Hacker News
3 months ago
Marketing tech

Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More

Cybercriminals now employ easy-to-use AI tools that lower the skill barrier for attacks.
Even small targets are at risk due to advanced fake identities and insider tactics.
Fast response is critical as waiting allows attackers to gain an advantage.
fromTechCrunch
4 months ago
Growth hacking

Russian zero-day seller is offering up to $4 million for Telegram exploits | TechCrunch

Operation Zero is seeking Telegram exploits, offering up to $4 million, highlighting the demand for security vulnerabilities amidst geopolitical tensions.
fromTechCrunch
3 months ago
Privacy technologies

Government hackers are leading the use of attributed zero-days, Google says | TechCrunch

Growth hacking
fromTechCrunch
4 months ago

Russian zero-day seller is offering up to $4 million for Telegram exploits | TechCrunch

Operation Zero is seeking Telegram exploits, offering up to $4 million, highlighting the demand for security vulnerabilities amidst geopolitical tensions.
Apple
fromThe Hacker News
3 months ago

Apple Patches Two Actively Exploited iOS Flaws Used in Sophisticated Targeted Attacks

Apple released security updates addressing two actively exploited vulnerabilities in its operating systems.
The updates were prompted by reports from Google TAG and focus on core security flaws in audio processing and RPAC components.
fromTechRepublic
3 months ago

Apple Patches Critical Vulnerabilities in iOS 15 and 16

Apple has released security updates addressing three zero-day vulnerabilities in older operating systems, protecting against sophisticated attacks.
fromDatabreaches
7 months ago

Clop ransomware claims responsibility for Cleo data theft attacks

The Clop ransomware gang confirmed they exploited zero-day vulnerabilities to launch data-theft attacks against Cleo, who provides secure file transfer solutions for businesses.
Information security
[ Load more ]