Zero-Day Exploit
Discover expert analysis on zero day exploits with news, features and insights from the team at IT Pro.
-
Millions of WordPress sites targeted by File Manager zero-day
News A dramatic surge in attacks saw one million sites targeted on 4 September alone
By Keumars Afifi-Sabet Published
News -
Sophos fixes firewall bug being actively exploited in SQL injection attacks
News Customised 'Asnarok’ malware targeted virtual and physical firewalls to attempt to exfiltrate user information
By Keumars Afifi-Sabet Published
News -
Mozilla fixes two Firefox zero-days being actively exploited
News Critical vulnerabilities allow attackers to execute arbitrary code or trigger crashes
By Carly Page Published
News -
Mozilla fixes Firefox zero-day being actively exploited
News The US cyber security agency has warned the vulnerability is being used to take control of users’ machines
By Keumars Afifi-Sabet Published
News -
Tenable: There are far more dangerous threats than zero-days
News ‘If you’re scared of zero-days, you don’t know what you’re talking about’ claims Tenable
By Connor Jones Published
News -
Apple rolls out its own fix for Zoom zero-day
News The exploit allowed websites to forcibly activate a user's webcam
By Connor Jones Published
News -
How Mr. Robot ‘fudged’ its hacks to protect the public
Case Studies Showrunners debated over how accurate to make the show’s exploits
By Adam Shepherd Published
Case Studies -
WhatsApp call hack installs spyware on users’ phones
News iPhones and Android devices are vulnerable to security flaw – WhatsApp recommends immediate app update
By Jane McCallion Published
News -
The Equifax Effect: Explaining the disaster
In-depth We take a deep-dive into how the credit agency got so much so wrong
By Adam Shepherd Published
In-depth -
Chrome exploit worked hand-in-hand with Windows bug
News Google has only seen the vulnerabilities actively exploited on 32-bit Windows 7 machines
By Keumars Afifi-Sabet Published
News -
Internet Explorer and Exchange zero-days get patched
News Exploit code is known to be in circulation for both vulnerabilities
By Adam Shepherd Published
News -
Three key pillars of threat visibility
In-depth For a company to see what threats they’re up against, they need visibility into all the data available
By Esther Kezia Thorpe Published
In-depth