In this article, Infosecurity has set out the top ten cyber-attacks of 2025, which have been decided based on factors such as ...
In an increasingly digitized world, cybersecurity remains a critical concern. Research shows that cyberattacks spike during holiday seasons. As people ...
Ransomware actors have been observed exploiting a zero-day Bring Your Own Vulnerable Driver (BYOVD) flaw in Paragon Partition Manager. The CERT Coordination Center (CERT/CC) issued a security update ...
Browser exploits continue to haunt enterprise security. In May, Microsoft patched a browser vulnerability that could allow attackers to force Edge users into Internet Explorer compatibility mode, ...
Security experts are warning that ready-made code which exploits a recently announced Cisco Systems IOS operating system vulnerability is circulating and attacks using the exploit are taking place.
Attackers are exploiting two CVSS 9.8 FortiGate SSO authentication bypass flaws days after disclosure; Fortinet urges ...
Over the past week, enterprise security teams observed a combination of covert malware communication attempts and aggressive probing of publicly exposed infrastructure. These incidents, detected ...
With the popularity of the Netflix series Zero Day among cybersecurity experts and others, the show has evolved into an interesting reference for comprehending the far-reaching effects of zero-day ...
Hackers working on the open-source Metasploit project have spiffed up a zero-day attack on Microsoft’s Internet Explorer, making it more reliable — and more likely to be used by criminals. Security ...
The US military launched a wave of strikes against targets in central Syria on December 19 in response to an attack on US ...
Two new attacks exploit a vulnerability in Windows shortcuts -- and security experts expect many more as virus writers pick up on the Stuxnet worm The Windows attack used by a recently discovered worm ...
A week before Adobe is scheduled to patch a critical vulnerability in its popular PDF software, hackers are actively exploiting the bug with both targeted and large-scale attacks, a security ...