Zero-day Attack

Type: Keyphrase
Name: Zero-day Attack
First reported 3 hours ago - Updated 34 mins ago - 1 reports

White House networks hacked

Attackers intruded on unclassified White House computer networks in recent weeks, unidentified White House officials told the Washington Post .The newspaper's sources said that no damage has been detected, and the classified network apparently wasn't ... [Published Sophos Anti Virus - 3 hours ago]
First reported 3 hours ago - Updated 43 mins ago - 2 reports

Expert claims hacking Xiaomi server, firm calls it hoax

A Taiwanese cyber security expert has claimed to have compromised server of China based smartphone maker Xiaomi but the company called it a hoax."Chen Huang is an independent Taiwanese Security Expert. Session Abstract: In this session Taiwanese Researcher ... [Published Business Standard India - 1 hour ago]
First reported 15 hours ago - Updated 15 hours ago - 1 reports

Russia Link Said Suspected in White House Computer Attack

U.S. cybersecurity specialistssuspect that Russian government or criminal hackers wereresponsible for an attack on an unclassified White Housecomputer system, according to two American officials.It’s not clear whether the attack was carried out byRussian ... [Published Bloomberg - 15 hours ago]
Entities: White House, Attack, Russia
First reported 17 hours ago - Updated 17 hours ago - 1 reports

Microsoft releases a one-click fix to protect your browser

There's a major Internet bug called Poodle that has security experts, website operators and browser developers scrambling. It's a serious problem in an older encryption called SSL 3.0.-advertisement-At its most basic, Poodle lets hackers snoop on encrypted ... [Published Kim Komando - 17 hours ago]
First reported Oct 29 2014 - Updated 20 hours ago - 1 reports

How to prevent Samsung's Find My Mobile zero-day exploit

The Samsung line of smartphones has been hit with a vulnerability that should have you shutting off the Find My Mobile service. Jack Wallen explains.If you happen to be the owner of a Samsung smartphone, and you use their Find My Phone service, stop immediately. ... [Published Tech Republic - Oct 29 2014]
First reported Oct 29 2014 - Updated Oct 29 2014 - 1 reports

Report says Russia may be gathering intelligence with malware

Image via ewallpapers.euA new report by California-based cyber security firm Fire Eye says that a well known group of malware may have been developed and deployed by the Russian government to collect sensitive intelligence on militaries, governments, ... [Published Neowin.net - Oct 29 2014]
First reported Oct 27 2014 - Updated Oct 28 2014 - 1 reports

Fortnet introduces new virtual FortiSandbox

Network security company, Fortinet has announced that its FortiSandbox is now available as a virtual appliance. This flexible form factor will enable customers to easily deploy Advanced Threat Protection (ATP) sandboxes within their infrastructure, in ... [Published Telecompaper - Oct 27 2014]
First reported Oct 28 2014 - Updated Oct 28 2014 - 1 reports

IT security for the federal government

-- This week on "Federal Tech Talk" , Nick Urick of FireEye is in the studio to talk about advances in cybersecurity for federal agencies.Many security companies have divisions called "labs" but none are as active as FireEye. In fact, many security news ... [Published Federal News Radio 1500 AM - Oct 28 2014]
First reported Oct 27 2014 - Updated Oct 27 2014 - 1 reports

Monday review - the hot 19 stories of the week

Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.Watch the top news in 60 seconds , and then check out the individual links to read in more detail.[embedded content]Monday 20 October 2014 Whisper ... [Published Sophos Anti Virus - Oct 27 2014]
First reported Oct 26 2014 - Updated Oct 26 2014 - 1 reports

Cyberespionage Is Harder to Pin to a State Than Spying in the Physical World

Who’s in your network, checking out your data? The latest invasive digital creature is Sandworm , a piece of malware discovered to be using a previously unknown Windows vulnerability to infiltrate government networks, spying on systems at NATO, the European ... [Published Epoch Times - Oct 26 2014]
First reported Oct 24 2014 - Updated Oct 24 2014 - 1 reports

Has the "Sandworm" zero-day exploit burrowed back to the surface?

You may have noticed that Microsoft recently published a Security Advisory that sounds a lot like the "Sandworm" vulnerability all over again.Paul Ducklin explains... ... [Published Naked Security - Sophos - Oct 24 2014]
First reported Oct 23 2014 - Updated Oct 23 2014 - 2 reports

Microsoft plugs PowerPoint zero-day exploit with quick fix

Microsoft has released a temporary fix for a zero-day vulnerability in nearly all versions of Windows that could be exploited by cyber criminals using malicious PowerPoint documents.By persuading Windows users to open a malicious Office file with an Object ... [Published V3.co.uk - Oct 23 2014]

Quotes

"Xiaomi representatives contacted and requested us regarding the session. We have decided to withhold session till the time Xiaomi investigates data breach and accusations and works with the researcher to fix it" Indian Infosec Consortium CEO Jiten Jain said
speakers. The researcher was to "demonstrate how Xiaomi Phones have been"
According to a report by The Hacker News, Taiwanese security researcher Chen Huang contacted the website and "provided partial database of a few thousands of Xiaomi users, which confirmed that the millions of Xiaomi Mi accounts has already been compromised."

More Content

All (711) | News (358) | Reports (0) | Blogs (352) | Audio/Video (0) | Fact Sheets (0) | Press Releases (1)
sort by: Date | Relevance
SungardAS​Voice: Here's A Treat For Halloween: ... [Published Forbes.com - 58 mins ago]
Expert claims hacking Xiaomi server, firm calls... [Published Business Standard India - 1 hour ago]
Complexity for Retailers Creates Opportunities ... [Published Security Week - 2 hours ago]
Mi Accounts Compromised Claims Report, Hoax Say... [Published NDTV - 3 hours ago]
White House networks hacked [Published Sophos Anti Virus - 3 hours ago]
Xiaomi 'Mi Account' Usernames and Passwords All... [Published NDTV - 3 hours ago]
Xiaomi Data Breach — "Exposing Xiaomi" Talk Pul... [Published The Hacker News - 6 hours ago]
Russia Link Said Suspected in White House Compu... [Published Bloomberg - 15 hours ago]
Microsoft releases a one-click fix to protect y... [Published Kim Komando - 17 hours ago]
How to prevent Samsung's Find My Mobile zero-da... [Published Tech Republic - Oct 29 2014]
T-Systems signs up FireEye for enterprise-focus... [Published European Communications - Oct 29 2014]
Deutsche Telekom : Cyber Defense: FireEye and D... [Published 4 Traders - Oct 29 2014]
Report says Russia may be gathering intelligenc... [Published Neowin.net - Oct 29 2014]
Chinese APT Group Axiom Is Highly Technical and... [Published Softpedia - Oct 28 2014]
Advanced Malware Detection Now Available with B... [Published Prlog - Oct 28 2014]
Complete protection – the case for containment [Published Channel Pro - Oct 28 2014]
Targeted ‘malvertising’ reveals move towards mo... [Published Conversation UK - Oct 28 2014]
IT security for the federal government [Published Federal News Radio 1500 AM - Oct 28 2014]
Fortnet introduces new virtual FortiSandbox [Published Telecompaper - Oct 27 2014]
Monday review - the hot 19 stories of the week [Published Sophos Anti Virus - Oct 27 2014]
Next-Generation Firewalls Must Evolve to Remain... [Published Fresh Business Thinking - Oct 27 2014]
Column: The ethics of hacking [Published Walla Walla Union-Bulletin - Oct 26 2014]
Cyberespionage Is Harder to Pin to a State Than... [Published Epoch Times - Oct 26 2014]
McAfee Next-Gen Firewall Empowers Enterprises [Published Enterprise Channels MEA - Oct 26 2014]
NEXT-GENERATION FIREWALLS MUST EVOLVE TO REMAIN... [Published Global Banking & Finance Review - Oct 25 2014]
POODLEs, Sandworms and getting safe online - 60... [Published Sophos Anti Virus - Oct 25 2014]
'Spear-phishing' tactics becoming more sophisti... [Published Federal Times - Oct 24 2014]
Fear of Ebola Used for New Cyber-Attacks [Published Channelpro - Oct 24 2014]
There’s a chance your Windows computer is being... [Published BGR - Oct 24 2014]
Has the "Sandworm" zero-day exploit burrowed ba... [Published Naked Security - Sophos - Oct 24 2014]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Has the "Sandworm" zero-day exploit burrowed ba... [Published Naked Security - Sophos - Oct 24 2014]
You may have noticed that Microsoft recently published a Security Advisory that sounds a lot like the "Sandworm" vulnerability all over again.Paul Ducklin explains... ...
Microsoft plugs PowerPoint zero-day exploit wit... [Published Security - v3 - Oct 23 2014]
Temporary fix aims to circumvent a bug that affects nearly all versions of Windows /p> ...
Attack of the malicious document – what was old... [Published Security Bloggers Network - Oct 22 2014]
Recent zero day attacks targeting Windows using malicious Office documents should be a reminder to all of us that no attack vector ever truly dies, it just lurks in the background waiting for it’s time to come again. Malicious Office documents have not ...
Zero-Day Remote Code Execution Flaw Disclosed b... [Published HOTforSecurity - Oct 22 2014]
Microsoft has disclosed on Tuesday in a Security Advisory a Windows OLE zero-day remote code execution (RCE) vulnerability  in PowerPoint and released a quick fix. The vulnerability impacts all Windows versions, except Windows Server 2003 and it ...
Windows Zero-Day Exploited in Targeted Attacks ... [Published SecurityWeek RSS Feed - Oct 22 2014]
Microsoft has become aware of targeted cyberattacks leveraging a new vulnerability (CVE-2014-6352) that affects most supported Windows releases, according to an advisory company published by the company on Tuesday. read more ...
1 2 3 4 5 6 7 8 9 10 ...

Press Releases

sort by: Date | Relevance
Bit9 + Carbon Black Free Webinar -- Advanced Th... [Published GlobeNewswire: Acquisitions News - Aug 13 2014]
1
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.