#zero-day-exploits

[ follow ]
#cybersecurity
Growth hacking
fromTechCrunch
1 month ago

Russian zero-day seller is offering up to $4 million for Telegram exploits | TechCrunch

Operation Zero is seeking Telegram exploits, offering up to $4 million, highlighting the demand for security vulnerabilities amidst geopolitical tensions.
fromDatabreaches
4 months ago
Information security

Clop ransomware claims responsibility for Cleo data theft attacks

The Clop ransomware gang utilized zero-day exploits to attack Cleo and steal sensitive data.
fromThe Hacker News
1 week ago
Marketing tech

Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More

Cybercriminals now employ easy-to-use AI tools that lower the skill barrier for attacks.
Even small targets are at risk due to advanced fake identities and insider tactics.
Fast response is critical as waiting allows attackers to gain an advantage.
fromTechRepublic
1 month ago
Apple

Apple Patches Critical Vulnerabilities in iOS 15 and 16

Apple has released security updates addressing three zero-day vulnerabilities in older operating systems, protecting against sophisticated attacks.
fromTechCrunch
1 week ago
Privacy technologies

Government hackers are leading the use of attributed zero-days, Google says | TechCrunch

Government-backed hackers are responsible for most zero-day exploits in cyberattacks, indicating a significant trend in malicious cyber activities.
Growth hacking
fromTechCrunch
1 month ago

Russian zero-day seller is offering up to $4 million for Telegram exploits | TechCrunch

Operation Zero is seeking Telegram exploits, offering up to $4 million, highlighting the demand for security vulnerabilities amidst geopolitical tensions.
fromDatabreaches
4 months ago
Information security

Clop ransomware claims responsibility for Cleo data theft attacks

The Clop ransomware gang utilized zero-day exploits to attack Cleo and steal sensitive data.
fromThe Hacker News
1 week ago
Marketing tech

Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More

Cybercriminals now employ easy-to-use AI tools that lower the skill barrier for attacks.
Even small targets are at risk due to advanced fake identities and insider tactics.
Fast response is critical as waiting allows attackers to gain an advantage.
fromTechRepublic
1 month ago
Apple

Apple Patches Critical Vulnerabilities in iOS 15 and 16

Apple has released security updates addressing three zero-day vulnerabilities in older operating systems, protecting against sophisticated attacks.
fromTechCrunch
1 week ago
Privacy technologies

Government hackers are leading the use of attributed zero-days, Google says | TechCrunch

Government-backed hackers are responsible for most zero-day exploits in cyberattacks, indicating a significant trend in malicious cyber activities.
more#cybersecurity
[ Load more ]