Common Vulnerabilities and Exposures (CVE) stories - Page 5
Zero-day Internet Explorer vulnerability exploited in the wild
Wed, 25th Sep 2019
#
microsoft
#
security vulnerabilities
#
patching
Microsoft released an out-of-band patch for the vulnerability discovered by Google researchers due to the report that it has been exploited in the wild.
Check Point names February's most disruptive malware
Tue, 12th Mar 2019
#
security vulnerabilities
#
coinhive
#
cryptomining
Coinhive tops Check Point's Global Threat Index for February 2019, marking its 15th month as the most disruptive malware despite its impending shutdown.
Attackers exploit macro-less Office documents to create havoc
Tue, 3rd Apr 2018
#
malware
#
firewalls
#
network infrastructure
Cybercriminals use Microsoft Office documents to conduct 'macro-less' attacks that dodge organisations' defences and inject malware.
China cyberespionage group targets US maritime & engineering sectors
Mon, 19th Mar 2018
#
malware
#
breach prevention
#
cybersecurity
A China-based cyberespionage group may be targeting United States engineering and maritime industries tied up in activities about the South China Sea.
Australia a hot target for BEC scams, malicious URLs and malware
Tue, 12th Sep 2017
#
malware
#
cybersecurity
#
trend micro
More than a quarter of all business email compromise (BEC) scams around the world target Australia, new research says.
State-sponsored election hacks are acts of cyber warfare - survey
Mon, 11th Sep 2017
#
elections
#
venafi
#
security vulnerabilities
78% of respondents said they would deem an act as cyber war if a nation-state was behind a successful or attempted hack of another country's election.
New Sofacy attacks against US government agency
Wed, 15th Jun 2016
#
firewalls
#
network infrastructure
#
network security
Recently, Unit 42 identified a spear phishing e-mail from the Sofacy group that targeted the United States government - here is a rundown.
The surprisingly scary patterns revealed in hack attacks
Thu, 3rd Mar 2016
#
cybersecurity
#
software development
#
hackers
When analysing multi-attack campaigns against industrial and government interests, patterns emerge. Scary patterns.