Home Search
Zero-day - search results
If you're not happy with the results, please do another search
Microsoft Fixed A Windows 0-Day Along With 96 Other Vulnerabilities
Microsoft released a security update under patch Tuesday for April and fixed 97 vulnerabilities affecting various products, including a Windows zero-day bug that was...
Google to Integrate Chat AI to it’s Search Engine, Says Sundar Pichai
Google has officially confirmed that it is working on conversational artificial intelligence for its search engine since the AI evolution pressures its business.
Sundar...
Adobe Reset User Password in Awake of Data Breach Risks
An email has been dispatched by Adobe, a renowned software firm recognized for its widely-used creative tools, requesting its users to modify their passwords.
The...
Google VS North Korean APT – How Google Fight With Gov-Backed NK APT Hackers
Google's TAG (Threat Analysis Group) released defensive measures that followed to protect users from the infamous North Korean government-backed APT group attacks.
After Mendiant's recent...
Microsoft OneNote Security Blocks 120 File Extensions to Tighten Security
To better protect users, Microsoft has published detailed information on the dangerous embedded files that OneNote will soon block.
“To help protect you and your...
Hackers Exploit Zimbra Vulnerability to Gain Access to Email Mailboxes
It has been observed by Proofpoint researchers that TA473, a newly minted APT actor, abuses publicly facing Zimbra-hosted webmail portals by exploiting a vulnerability...
Windows 11, Tesla, macOS & Ubuntu Desktop Hacked – Pwn2Own Day One
On the first day, Pwn2Own Vancouver 2023 hacking challenge participants compromised Windows 11, Tesla, macOS, and Ubuntu Desktop.
AbdulAziz Hariri of Haboob SA, who completed...
Attackers Offering Fake Malware Analysis Job Offers Targeting Security Researchers
Mandiant security researchers have recently identified a group of hackers which is believed to be from North Korea is actively seeking security researchers and...
11 Best Network Security Solutions – 2024
Introduction :
Network security solutions are essential for safeguarding client data and information, maintaining the security of shared data, ensuring dependable network performance, and defending...
RedEyes Hacking Group Uses Steganography Technique to Deploy Malware on PC & Mobile Phones
RedEyes Hacking Group (aka APT37), a threat group known for its cyber espionage activities, has recently adopted a new tactic in its efforts to...