News

Speaking at EthCC in France, Ethereum’s founder said developers need to stay true to crypto’s principles amid a wave of ...
Remote learning technology and BYOD policies increase your K-12 school's attack surface, including its susceptibility to zero-day attacks. With ...
Zerolimit Technology Holding has filed for an initial public offering. The Cayman Islands holding company plans to offer 2 million units at $4 apiece, according to a filing with the Securities and ...
AI security can’t be an afterthought; it must be built into every layer of your defence strategy.  One of the most effective ways to reduce risk is by applying the principle of “least privilege.” It’s ...
BeyondTrust has released security updates to fix a high-severity flaw in its Remote Support (RS) and Privileged Remote Access ...
ConnectWise, the developer of remote access and support software ScreenConnect, has confirmed it was targeted by a cyber-attack from a nation-state threat actor. In a message sent to Infosecurity, a ...
Based on Commvault’s investigation, the nation-state actors obtained, through zero-day abuse of CVE-2025-3928, a subset of app credentials that certain Commvault customers used to authenticate ...
Play ransomware exploited Windows zero-day. getty Update, May 8, 2025: This article has been updated with comments from a cybersecurity expert regarding the use of zero-day exploits in the Play ...
Google has a few examples of the zero-day hacks it detected, as well as a full report (PDF) with technical details. One of Google's callouts is the CIGAR Local Privilege Escalation, which targeted ...
Microsoft vulnerability volume reaches new peak The findings align with BeyondTrust’s 12th annual report, which showed that 2024 marked a record year for Microsoft software vulnerabilities.
They’re not as long as this is, so you get a lot more done than what we did in those previous situations.” “Zero Day” is one of several paranoid thrillers on TV right now.