Millie
your market intelligence analyst
Search Results
582 results
Your search is now limited to «Exploits and Security Flaws» expert search.
BleepingComputer.com 10/18/2019 14:02
Upon successful exploitation, the exploit kit will automatically download and install the Maze Ransomware payload via arbitrary code execution.
More from BleepingComputer.com:
SecurityWeek 10/18/2019 03:04
This week, Grant Hernandez, a PhD candidate at the Florida Institute of Cyber Security at the University of Florida, published a blog post containing a working proof-of-concept exploit targeting the vulnerability.
More from SecurityWeek:
GBHackers On Security 10/18/2019 02:03
Researchers discovered various unusual activities in UC Browser for Android and it abusing the Google play policies and exposing more than 500 users to Man-in-the-Middle attacks. UC browser is the most popular browser in the Android platform with more than 500 million users and UC Browser Mini has 100 million downloads from the Google Play store […]. .
More from GBHackers On Security:
Help Net Security 10/18/2019 00:30
As car manufacturers focus on connectivity, hackers begin to exploit flaws.
More from Help Net Security:
Listen to the latest episode now!
More from Naked Security - SophosLabs blog:
ZDNet - Blogs 10/16/2019 17:45
At the time, Google said the zero-day was being actively exploited in the wild.
More from ZDNet - Blogs:
Security Bloggers Network 10/14/2019 05:16
Bitdefender researchers Mihai Neagu and Cosmin Carp have taken a closer look at the Fallout Exploit kit as used in a campaign that leads to Raccoon Stealer.
More from Security Bloggers Network:
Global Security 10/14/2019 05:09
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY An attacker can act as a Man-in-the-Middle on Open Build Service osc, in order to read or write data in the session. Impacted products: openSUSE Leap. Severity: 2/4. Consequences: data reading, data creation/edition. Provenance: internet server. Confidence: confirmed by the editor (5/5). Creation date: 13/08/2019. DESCRIPTION OF THE VULNERABILITY The Open (...). -
More from Global Security:
MyBroadband (Africa) 10/14/2019 03:22
A zero-day security flaw in Apple Software Update, which is installed alongside the iTunes and iCloud for Windows apps, allows malicious parties to install ransomware on Windows computers.
More from MyBroadband (Africa):
Ubergizmo 10/11/2019 20:30
However, when files are unquoted, it leaves them open to the possibility of being exploited, where hackers/attackers can add malicious files to the service path and bypass security software.
More from Ubergizmo:
WCCFtech 10/11/2019 17:32
A zero-day vulnerability in Apple iTunes for Windows enabled attackers to bypass antivirus detection on Windows devices.
More from WCCFtech:
TechRadar 10/11/2019 12:47
A zero-day vulnerability in Apple’s iTunes (and iCloud) software for Windows PCs was leveraged by malicious parties to install ransomware on those machines, while bypassing any antivirus apps.
More from TechRadar:
Tech-Wreck InfoSec Blog 10/11/2019 11:03
Previously Disclosed vBulletin Zero-Day Seen in Active Exploits (10/09/2019) Palo Alto Networks researchers have identified active exploitation of a zero-day vBulletin bug in the wild.
More from Tech-Wreck InfoSec Blog:
MobileSyrup 10/11/2019 10:17
A zero-day vulnerability in iCloud and iTunes on Windows PCs allowed hackers to install ransomware undetected.
More from MobileSyrup:
Hacker Combat 10/11/2019 08:41
Microsoft released a new series of security patches in Internet Explorer for a zero-day bug, originally addressed on September 23.
More from Hacker Combat:
Next Web 10/11/2019 06:40
Apple has patched a zero-day flaw in iTunes app for Windows that allowed hackers to escape detection and install BitPaymer ransomware.
More from Next Web:

Information Technologies

IT Markets

Business Issues

Companies - Public

Companies - Venture Funded

Analysts

Analyst Firms

Global Markets

Global Risk Factors

Government Agencies

Job Titles

Legal and Regulatory

Political Entities

Sources

Strategic Scenarios

Trends

Hints:

On this page, you see the results of the search you have run.  You may also view the following:

  •  Click on this drop-down menu on the right hand side of the page, to choose between the machine learning-produced Insights Reports, or the listing of concepts extracted from the results, in chart or list format. 


  •  View the number of search results returned for the search in each of your collections, and click on any of those numbers to view the entire listing of results from the chosen collection.

  •  Use the search adjustment drop-downs to change the scope, sorting, and presentation of your results.

  •  Show or hide the record’s caption (content description).

  •  Show actions that can be made with the search result record.

  •  Click on the Save button after running your search, to save it so that its results will be updated each time relevant new content is added to the designated collection. You may choose to be notified via search alerts.

Click here for more info on Search Results

Click here for more info on Machine Learning applications