EHA
Home Search

Zero-day - search results

If you're not happy with the results, please do another search
Hackers Attacking Windows Users With Internet Explorer Zero-Day Vulnerability

Hackers Attacking Windows Users With Internet Explorer Zero-Day Vulnerability

Hackers target legitimate Remote Monitoring and Management (RMM) tools as they provide powerful, trusted access to systems and networks. This can facilitate the widespread and...
Hackers Weaponizing Shortcut Files With Zero-day Tricks To Attack Windows Users

Hackers Weaponizing Shortcut Files With Zero-day Tricks To Attack Windows Users

Hackers weaponize shortcut files because they are an inconspicuous way to execute malicious code on a target system.  These files can be disguised as harmless...
Microsoft Patch Tuesday July 2024

Microsoft Patch Tuesday July 2024 : 4 Zero-days, 59 Code Execution & 75 Flaws...

Microsoft's July 2024 Patch Tuesday has brought a significant wave of updates, addressing a total of 139 vulnerabilities across various products and components. This...
Cisco NX-OS Zero-Day Command Injection Flaw Under Active Attack

Cisco NX-OS Zero-Day Command Injection Flaw Under Active Attack

A critical vulnerability in the Command Line Interface (CLI) of Cisco NX-OS Software is currently under active exploitation, allowing attackers to execute arbitrary commands...
AI-Powered Browsers Detecting Zero-Day Phishing Attacks in High Accuracy

AI-Powered Browsers Detecting Zero-Day Phishing Attacks in High Accuracy

Researchers have developed a real-time browser extension integrated with machine learning algorithms to detect phishing websites with remarkable accuracy. This innovative approach promises to...
Black Basta Actors Exploited Windows Zero-day Privilege Escalation Vulnerability

Black Basta Actors Exploited Windows Zero-day Privilege Escalation Vulnerability

The Cardinal cybercrime group (aka Storm-1811, UNC4393), which operates the Black Basta ransomware, may have been exploiting a recently patched Windows privilege escalation vulnerability...
Huge Surge in Attacks Exploiting Check Point VPN Zero-Day Vulnerability

Huge Surge in Attacks Exploiting Check Point VPN Zero-Day Vulnerability

Check Point published an advisory regarding a critical vulnerability, CVE-2024-24919, which has since seen a surge in exploitation attempts. The vulnerability, rated with a CVSS...
TikTok Zero-Day Vulnerability

Hackers Exploited TikTok Zero-Day Vulnerability to Hijack High-Profile Accounts

TikTok has confirmed that hackers exploited a zero-day vulnerability in its direct messaging (DM) feature to hijack several high-profile accounts. The affected accounts include...
RedTail Cryptominer Exploiting Palo Alto Networks Firewall Zero-day Flaw

RedTail Cryptominer Exploiting Palo Alto Networks Firewall Zero-day Flaw

The RedTail cryptocurrency mining malware has been observed exploiting a critical zero-day vulnerability in Palo Alto Networks' firewall software, PAN-OS. This vulnerability, tracked as CVE-2024-3400,...
Check Point VPN Zero-Day Vulnerability

Check Point VPN Zero-Day Vulnerability Exploited in Wild to Gain Remote Access

Check Point, a leading cybersecurity vendor, has released emergency patches to address a critical zero-day vulnerability in its VPN products that threat actors have...

Managed WAF

Website

Latest News