Please turn on your JavaScript for this page to function normally.
Most exploit kits originated in Russia, say researchers

58 percent of the vulnerabilities targeted by the most popular exploit kits in Q4 were more than two years old and 70 percent of exploit kits reviewed were released or …

Dangerous remote Linksys 0-day root vulnerability discovered

DefenseCode researchers have uncovered a remote root access vulnerability in the default installation of Linksys routers. They contacted Cisco and shared a detailed …

Oracle patches critical 0-day with new Java update

Oracle has released Java 7 Update 11, the computing platform’s newest version that patches the recently discovered and currently widely misused zero-day vulnerability, …

Disable Java! Recent 0-day exploit is included in exploit kits

The Java zero-day that has recently been spotted being exploited in the wild has turned into big, big news as a number of popular exploit kits have been fitted with the …

New Java 0-day exploited in the wild

A new Java zero-day being exploited in the wild has been found. With the files we were able to obtain we reproduced the exploit in a fully patched, new installation of Java. …

IE zero-day used in targeted watering hole attacks

News that an Internet Explorer zero-day vulnerability was being and has been for quite some time been used in a new “watering hole” attack has livened the …

Most unique viruses of 2012

PandaLabs outlined its picks for the most unique viruses of the past year. Rather than a ranking of the most widespread viruses, or those that have caused most infections, …

Will the Sweet Orange exploit kit dethrone Blackhole?

There’s a new exploit kit being offered for sale and it seems to be slowly but surely gaining in popularity. Dubbed Sweet Orange, the kit uses exploits for Java, PDF, IE …

Cloud exploits and mobile device attacks on the horizon

Although many security experts predict that the most likely data breach threats organizations will face in 2013 include cloud exploits, mobile device attacks and all-out cyber …

Exploits, security threats and hacks will mutate in 2013

Lamar Bailey, Director of Security Research and Development with nCircle, has released his top five security threats to watch out for in 2013. The New Year – and beyond …

Fake CitiBank credit card statement leads to malware

CitiBank customers are advised to tread carefully through their email inboxes as fake credit card statements sporting the bank’s name could be waiting for them: The …

ExploitHub confirms breach

ExploitHub.com, the well-known online marketplace where one can buy exploit code for disclosed vulnerabilities, has confirmed that its web application server was compromised, …

Don't miss

Cybersecurity news