Security News > 2015 > July > Cybercriminals are preying on existing vulnerabilities to plan future attacks (Help Net Security)
2015-07-31 07:54
Solutionary performed a broad analysis of the threat landscape, which unearthed several key findings. They identified several campaigns targeting the bash vulnerability during the latest quarter - mor...
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/Tou5zYH9clU/secworld.php
Related news
- Israel’s Pager Attacks and Supply Chain Vulnerabilities (source)
- CUPS vulnerabilities could be abused for DDoS attacks (source)
- Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks (source)
- WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks (source)
- Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries (source)
- The Rise of Zero-Day Vulnerabilities: Why Traditional Security Solutions Fall Short (source)
- EDRSilencer red team tool used in attacks to bypass security (source)
- ISC2 Security Congress 2024: The Landscape of Nation-State Cyber Attacks (source)
- Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks (source)
- Stop LUCR-3 Attacks: Learn Key Identity Security Tactics in This Expert Webinar (source)