Google’s Threat Analysis Group (TAG) and Mandiant teams observed 97 zero-day vulnerabilities exploited in the wild last year, a staggering 56% increase over 2022's 62 zero-day exploits, but shy of ...
Trust Wallet, one of the most widely used non-custodial digital asset storage applications, issued an urgent security alert ...
Vulnerabilities in enterprise network and security appliances accounted for nearly half of the zero-day flaws exploited by attackers last year, according to Google’s Threat Intelligence Group.
CrushFTP, a service that provides users with secure file server software, has recently been targeted by hackers. Unfortunately, it seems as if some customers have been compromised, with thousands of ...
A sweeping cyber espionage campaign exploiting a newly discovered zero-day vulnerability in self-hosted Microsoft (MSFT) SharePoint servers compromised nearly 100 organizations, researchers at Eye ...
Ransomware actors have been observed exploiting a zero-day Bring Your Own Vulnerable Driver (BYOVD) flaw in Paragon Partition Manager. The CERT Coordination Center (CERT/CC) issued a security update ...
Thousands of Ivanti VPN instances have been compromised across the globe in the last five days thanks to two serious, as yet unpatched zero-day vulnerabilities disclosed last week. Ivanti Connect ...
Russians offer $4 million for Telegram Messenger hack attack. Update, March 23, 2025: This story, originally published March 22, has been updated with a statement from Telegram. When it comes to ...
Another major flaw has been found in Chrome—and it’s already being exploited in the wild. First discovered by Google’s Threat Analysis Group on May 27th, this zero-day vulnerability allows attackers ...
Zero-day attacks have become a significant concern in the realm of cybersecurity, posing a formidable challenge to individuals and organizations alike. These attacks exploit vulnerabilities that are ...
A Russian speaking hacking group is exploiting a zero-day flaw in WinRAR, a sign of the group's growing sophistication and evolution from a cybercrime outfit into a cyberespionage operation.
Ransomware hits 20 targets per day as attackers exploit unconventional entry points for lateral movement Forescout Technologies, Inc., a global leader in cybersecurity, today released its 2025H1 ...