Exploit packages in-the-wild became the game changer of the cyber threat landscape in Q2 2017. In just 3 months, according …
FireEye: Petya is spreading via EternalBlue exploit
According to reports, this variant of the Petya ransomware may be spreading via the EternalBlue exploit used in the WannaCry attack from last month.
Shadow Brokers teases more Windows exploits
A group of hackers that previously leaked alleged U.S. National Security Agency exploits claims to have even more attack tools …
Microsoft: Past patches address Shadow Brokers exploits
Microsoft said it has already patched vulnerabilities revealed in Friday’s high-profile leak of suspected U.S. National Security Agency spying tools, …
Sophos launches new anti-exploit technology
Sophos has launched Intercept X, an endpoint security product for zero-day malware, unknown exploit variants and stealth attacks, and includes an advanced anti-ransomware feature that can detect previously unknown ransomware within seconds.
Sophos unveils new anti-exploit and anti-ransomware technology
Sophos has launched Intercept X, an endpoint security product for zero-day malware, unknown exploit variants and stealth attacks, and includes an advanced anti-ransomware feature that can detect previously unknown ransomware within seconds.
FireEye uncovers China-based hacker exploits
According to a recent report by FireEye, a hacking group suspected of operating from China has had success stealing information from mostly Indian targets, often pertaining to border disputes and trade issues.
Bloomberg: NSA secretly exploited Heartbleed bug for years
News agency Bloomberg has alleged that the NSA has exploited the ‘Heartbleed’ OpenSSL bug for years to gather passwords and usernames of citizens.
New Windows privilege escalation flaw exploited in active attacks
Attackers are exploiting a new and unpatched vulnerability in Windows XP and Windows Server 2003 that allows them to execute code with higher privileges than they have access to.
Cybercriminals target Silverlight users with new exploit kit
The creators of a Web-based attack tool called Angler Exploit Kit have added an exploit for a known vulnerability in …
Chinese authorities exploit Office for Mac hole
Chinese authorities may be exploiting a security hole in Microsoft Office for Mac to target the Uyghur people, an ethnic …
Adobe Reader exploit ‘part of cyber espionage operation’
The head of the malware analysis team at antivirus vendor Kaspersky said last week that a recently found exploit that …
2012 ‘year of the exploit’
In a security landscape report released on Tuesday, security software maker F-Secure claimed that 2012 was the “year of the …
Microsoft confirms hackers exploiting critical IE bug, promises patch
Microsoft on Monday issued a security advisory that confirmed in-the-wild attacks are exploiting an unpatched bug in Internet Explorer. The …
Unpatched Java vulnerability exploited in Blackhole attacks
Attacks targeting an unpatched vulnerability in the latest versions of Java 7 have become widespread after an exploit for the …
Software exploits dropped to new low in 2011, says IBM X-Force
Software exploits aimed at known security vulnerabilities dropped in 2011 to their lowest level for half a decade, a surprisingly …
Facebook scams exploit Norway tragedy
Facebook scams are popping up from people looking to exploit Friday’s bombing and shootings in Norway. Users should be careful …
Cybercriminals selling exploit-as-a-service kit
Cybercriminals are taking a page from the software-as-a-service playbook: they’re now selling exploit kits complete with hosting services, with customers …
Hackers wield newest IE exploit in drive-by attacks
Hackers are attacking consumers with an exploit of Internet Explorer (IE) that was allegedly used last month by the Chinese …
Hackers wield newest IE exploit in drive-by attacks
Hackers are attacking consumers with an exploit of Internet Explorer (IE) that was allegedly used last month by the Chinese …