Zero-day Attack

Type: Keyphrase
Name: Zero-day Attack
First reported Jul 26 2014 - Updated Jul 26 2014 - 3 reports

Guess which browser has the most security flaws

Surprise! The latest version of Internet Explorer is still the number one target for hackers, according to a report by cybersecurity firm Bromium. The report also reveals other trends in cybersecurity.-advertisement-For the first half of 2014, the report ... [Published Kim Komando - Jul 26 2014]
First reported Jul 26 2014 - Updated Jul 26 2014 - 1 reports

Hacking: The $3 Trillion Threat

With a constantly growing threat landscape, cyber attacks pose one of the largest risks to businesses in the GCC and abroad.ByRobert Anderson1 hour agoTo assess the growing concern regarding cyber attacks, you need to look no further than this year’s ... [Published Gulf Business - Jul 26 2014]
First reported Jul 25 2014 - Updated Jul 25 2014 - 1 reports

United Kingdom : TECH DATA, SaaS inks contract

As per the report, through TDCloud, the distributor s go-to team of cloud experts, both the firms have inked the contract in which Tech Data s solution providers will have access to McAfee s SaaS solution.The following integrated security services ... [Published HispanicBusiness.com - Jul 25 2014]
First reported Jul 24 2014 - Updated Jul 24 2014 - 1 reports

Google unveils elite hacker squad

Google's Project Zero team to clean up the internet. Photo: 123rf.com Google has unveiled an elite squad of hackers tasked with scouring the internet for security holes and defending the public against cyberattacks.Unveiled on Wednesday as "Project Zero", ... [Published Canberra Times - Jul 24 2014]
First reported Jul 24 2014 - Updated Jul 24 2014 - 2 reports

Is Internet Explorer emerging as 'sweet spot for hackers?

IE also remains one of the most exploited products.The number of Internet Explorer vulnerabilities have increased by more than 100% since 2013, leading to the release of the highest number of security patches in more than a decade during the first six ... [Published Computer Business Review - Jul 24 2014]
First reported Jul 24 2014 - Updated Jul 24 2014 - 1 reports

European Central Bank Hacking: What Can We Learn?...

CybercrimePosted by IDG Connecton July 24 2014In the news today we have seen that European Central Bank (ECB) has been hacked , with attackers stealing around 20,000 email addresses and contact data from the bank’s public website. Worryingly, the theft ... [Published IDG Connect - Jul 24 2014]
First reported Jul 23 2014 - Updated Jul 23 2014 - 3 reports

Internet Explorer is the 'sweet spot' for attackers so far in 2014

After analyzing public vulnerabilities and exploit trends in the first half of 2014, Bromium Labs concluded that Internet Explorer is the “sweet spot for attackers.”“Internet Explorer was the most patched and also one of the most exploited products,” ... [Published NetworkWorld - Jul 23 2014]
First reported Jul 23 2014 - Updated Jul 23 2014 - 1 reports

Flash Player Is Top Plug-In Target for Zero-Day Attacks in First Half of 2014

A new report giving information about the latest trends in vulnerabilities leveraged by cybercriminals places Adobe’s Flash Player browser plug-in in top spot as far as zero-day attacks are concerned.Bromium, a firm providing endpoint security solutions, ... [Published Softpedia - Jul 23 2014]
First reported Jul 23 2014 - Updated Jul 23 2014 - 2 reports

ZDI-14-262: (0Day) Hewlett-Packard Data Protector Cell Request Service Opcode 305 Directory Traversal Arbitrary File Creation Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Data Protector. Authentication is not required to exploit this vulnerability. ... [Published ZDI: Published Advisories - Jul 23 2014]
First reported Jul 23 2014 - Updated Jul 23 2014 - 1 reports

ZDI-14-264: (0Day) Apple QuickTime 'mvhd' Atom Heap Memory Corruption Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. ... [Published ZDI: Published Advisories - Jul 23 2014]
First reported Jul 22 2014 - Updated Jul 23 2014 - 2 reports

CRN Magazine Names Votiro A 2014 ...

Votiro, the provider of Secure Data Sanitization solutions for protecting organizations against zero-day and other ongoing cyber-threats, announced today that the company has been selected as a 2014 Emerging Vendor by CRN magazine, the top news source ... [Published EFYTimes.com - Jul 23 2014]
First reported Jul 22 2014 - Updated Jul 22 2014 - 1 reports

[web applications] - Wordpress WP BackupPlus - Database And Files Backup Download (0day)

Quotes

"Conventional wisdom at Black Hat is that the attacker will always win," added Cross. "This session will help defenders generate the intelligenceintelligence information and disinformation advantage necessary to turn the tables."
"The notable aspect for this year thus far in 2014 is that Internet Explorer was the most patched and also one of the most exploited products, surpassing Oracle Java, Adobe Flash and others in the fray. Bromium Labs believes that the browser will likely continue to be the sweet spot for attackers" Bromium Labs said in its report
"This is further evidence that the world of Web browser plugins presents a weak link that is just waiting for exploitation in the future" says Bromium Labs
"Adapting quickly to new attack techniques is the key for modern cybersecurity warriors, and the new version of the Splunk App for Enterprise Security was built specifically to help organizations remain agile in this dynamic landscape of zero-day and previously unknown attacks" said Haiyan Song, vice president of security markets, Splunk

More Content

All (1038) | News (394) | Reports (0) | Blogs (641) | Audio/Video (0) | Fact Sheets (0) | Press Releases (1)
sort by: Date | Relevance
Lancope's Tom Cross Presenting on Applying Mili... [Published Vision Monday - 4 hours ago]
ISSAN decries absence of law to curb cybercrime [Published Nigeria Punch - 6 hours ago]
Guess which browser has the most security flaws [Published Kim Komando - Jul 26 2014]
Internet Explorer most vulnerable browser of 20... [Published domain-b - Jul 26 2014]
Internet Explorer the 'Most Vulnerable' Web Bro... [Published International Business Times UK - Jul 26 2014]
Hacking: The $3 Trillion Threat [Published Gulf Business - Jul 26 2014]
OPSEC In the Post Snowden World [Published Krypt3ia - Jul 25 2014]
Phishing and the threat to company data [Published Professional Security - Jul 25 2014]
Splunk announces availability of Splunk App ver... [Published Individual.com - Jul 25 2014]
ISSAN Decries Absence of Law to Curb Cybercrime [Published Individual.com - Jul 25 2014]
United Kingdom : TECH DATA, SaaS inks contract [Published HispanicBusiness.com - Jul 25 2014]
Pacific Ring of Fire: PlugX / Kaba [Published FireEye Blog - Jul 25 2014]
Cisco expands AMP and DC security solutions to ... [Published Enterprise IT News - Jul 24 2014]
Google unveils elite hacker squad [Published Canberra Times - Jul 24 2014]
Is Internet Explorer emerging as 'sweet spot fo... [Published Computer Business Review - Jul 24 2014]
European Central Bank Hacking: What Can We Lear... [Published IDG Connect - Jul 24 2014]
The 2014 Internet Security Threat Report: Year ... [Published Forbes.com - Jul 24 2014]
Researchers find serious flaw in I2P, an anonym... [Published GigaOM - Jul 24 2014]
Vulnerabilities in IE doubled in 1H 2014 [Published Dark Vision Hardware - Jul 24 2014]
Tails live OS affected by critical zero-day vul... [Published Security Affairs - Jul 24 2014]
Deal Secures More McAfee Biz for Tech Data VARs [Published Channelnomics - Jul 23 2014]
Internet Explorer is the 'sweet spot' for attac... [Published NetworkWorld - Jul 23 2014]
Flash Player Is Top Plug-In Target for Zero-Day... [Published Softpedia - Jul 23 2014]
Narus Solidifies Leadership in Innovation with ... [Published Myrtle Beach Sun News - Jul 23 2014]
Internet Explorer vulnerabilities have doubled ... [Published TheInquirer.net - Jul 23 2014]
Comodo SecureBox always assumes the worst to st... [Published Beta News - Jul 23 2014]
ZDI-14-262: (0Day) Hewlett-Packard Data Protect... [Published ZDI: Published Advisories - Jul 23 2014]
ZDI-14-263: (0Day) Hewlett-Packard Data Protect... [Published ZDI: Published Advisories - Jul 23 2014]
ZDI-14-264: (0Day) Apple QuickTime 'mvhd&#3... [Published ZDI: Published Advisories - Jul 23 2014]
Warning — Zero-Day Vulnerabilities Identified i... [Published The Hacker News - Jul 23 2014]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
OPSEC In the Post Snowden World [Published Krypt3ia - Jul 25 2014]
  OPSEC: Operations security (OPSEC) is a term originating in U.S. military jargon, as a process that identifies critical information to determine if friendly actions can be observed by adversary intelligence systems, determines if information ...
Pacific Ring of Fire: PlugX / Kaba [Published FireEye Blog - Jul 25 2014]
As depicted in earlier FireEye blogs , advanced cyber attacks are no strangers to the Asia Pacific region. In this blog, we take a deeper look at some of the advanced persistent threat (APT) malware that have significant presence in the APAC region, ...
Tails live OS affected by critical zero-day vul... [Published Security Affairs - Jul 24 2014]
A researchers at the Exodus Intelligence firm has discovered a series of zero day vulnerabilities in the popular Tails Linux-based distribution. A researcher at Exodus Intelligence has discovered critical zero-day vulnerabilit ies in the popular ...
ZDI-14-262: (0Day) Hewlett-Packard Data Protect... [Published ZDI: Published Advisories - Jul 23 2014]
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Data Protector. Authentication is not required to exploit this vulnerability. ...
ZDI-14-263: (0Day) Hewlett-Packard Data Protect... [Published ZDI: Published Advisories - Jul 23 2014]
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Data Protector. Authentication is not required to exploit this vulnerability. ...
1 2 3 4 5 6 7 8 9 10 ...

Press Releases

sort by: Date | Relevance
FireEye Releases Comprehensive Analysis of 2013... [Published GlobeNewswire: Acquisitions News - Mar 27 2014]
1
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.