News

Speaking at EthCC in France, Ethereum’s founder said developers need to stay true to crypto’s principles amid a wave of ...
Remote learning technology and BYOD policies increase your K-12 school's attack surface, including its susceptibility to zero-day attacks. With ...
AI security can’t be an afterthought; it must be built into every layer of your defence strategy.  One of the most effective ways to reduce risk is by applying the principle of “least privilege.” It’s ...
BeyondTrust has released security updates to fix a high-severity flaw in its Remote Support (RS) and Privileged Remote Access ...
ConnectWise, the developer of remote access and support software ScreenConnect, has confirmed it was targeted by a cyber-attack from a nation-state threat actor. In a message sent to Infosecurity, a ...
Based on Commvault’s investigation, the nation-state actors obtained, through zero-day abuse of CVE-2025-3928, a subset of app credentials that certain Commvault customers used to authenticate ...
Play ransomware exploited Windows zero-day. getty Update, May 8, 2025: This article has been updated with comments from a cybersecurity expert regarding the use of zero-day exploits in the Play ...
Google has a few examples of the zero-day hacks it detected, as well as a full report (PDF) with technical details. One of Google's callouts is the CIGAR Local Privilege Escalation, which targeted ...
Microsoft vulnerability volume reaches new peak The findings align with BeyondTrust’s 12th annual report, which showed that 2024 marked a record year for Microsoft software vulnerabilities.
They’re not as long as this is, so you get a lot more done than what we did in those previous situations.” “Zero Day” is one of several paranoid thrillers on TV right now.
As Zero Day explains, Kidder's apps are so popular that they are on 80% of all phones. Because of this, they became the perfect weapon to access nearly every bit of technology in the world.