The Latest in IT Security

Posts Tagged ‘zero-day vulnerabilities’

A new malware campaign leveraged two zero-day flaws in Cisco networking gear to deliver custom malware and facilitate covert data collection on target environments. Cisco Talos, which dubbed the activity ArcaneDoor, attributing it as the handiwork of a previously undocumented sophisticated state-sponsored actor it tracks under the name UAT4356 (aka Storm-1849 by Microsoft). Read More

Read more ...

Microsoft’s March dump of patches fixes two actively exploited zero-day vulnerabilities, including a critical severity issue the Outlook email client that Russian threat actors are using to target European companies. The other zero day vulnerability is a moderately-severe security feature bypass vulnerability in the Windows SmartScreen, a cloud-based anti-phishing and anti-malware software. Read More

Read more ...

Zero-click attack definition Zero-click attacks, unlike most cyberattacks, don’t require any interaction from the users they target, such as clicking on a link, enabling macros, or launching an executable. They are sophisticated, often used in cyberespionage campaigns, and tend to leave very few traces behind—which makes them dangerous. Once a device is compromised, an attacker […]

Read more ...


Categories

MONDAY, MARCH 10, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments