News

Software vendors are constantly on the watch for so-called "zero day" vulnerabilities--flaws in their code that hackers find and exploit before the first day companies become aware of them.
Additionally, attackers often launch these exploits on the same day the vulnerability becomes generally known--before a vendor has released a patch. Continue to the site → Meet the 2023 Rising Stars ...
This is the second Flash Player zero-day exploit discovered among the files and the third overall—researchers also found a zero-day exploit for a vulnerability in Windows.
The CVE-2025-6218 bug allows attackers to manipulate archive paths, potentially writing to protected system folders ...
A new book by leading security researchers on writing code to exploit security flaws in software, including Microsoft Corp.’s Windows operating system, has caused some raised eyebrows in the ...
Fifteen gigabytes of free storage may sound like a lot when you make a Gmail account but it gets filled up quickly. For ...
WinRAR flaw let crafted archives drop files outside target folder, including into Windows Startup New version 7.12 addresses ...
Exploit released for 9.8-severity PaperCut flaw ... Exploit code for a critical printer software vulnerability became publicly available on Monday in a release that may exacerbate the threat of ...
Three of the certificates came from the 2015 hack of Hacking Team, a developer of software exploits it sold to governments around the world.The remaining 10 have been available for years on a ...
Zero-day exploits are unknown vulnerabilities in software or hardware with no existing fix. The term “zero day” originates from the time remaining for a software vendor to patch buggy code.
Several US federal government agencies have been hit in a global cyberattack by Russian cybercriminals that exploits a vulnerability in widely used software, according to a top US cybersecurity ...