Microsoft has confirmed that a hacker who successfully exploits a zero-day SQL vulnerability could gain system administrator privileges. Here’s how to fix it.
While the ongoing war has brought attention to Iran’s cyber operations, threat intelligence indicates that China dominates ...
Microsoft is warning Windows users that they're vulnerable to a new zero-day flaw that attackers have been exploiting to remotely execute arbitrary code. "At this time, we are aware of limited, ...
Google has also warned that the way attackers use zero-days is changing and that enterprise technology is the new primary ...
Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities actively exploited throughout 2025, almost half of them in enterprise software and appliances.
The zero-day trend is clear ...
Google and Qualcomm have tag-teamed a serious vulnerability in the chipsets used in Android mobile devices, which has been ...
Chinese state hackers and spyware vendors are fueling a rise in zero-day attacks, which increasingly target enterprise software and devices — security and networking products in particular.
Apple has released emergency security updates to fix two zero-day vulnerabilities that attackers actively exploited in highly targeted attacks. The company described the activity as an "extremely ...
WhatsApp Zero-Day Attack: For millions of people, WhatsApp is a crucial part of daily life, used for chatting with friends, making calls, and sharing moments. But a fresh cybersecurity alert has ...
Attack surface exposure leaves services reachable as exploits appear within 24–48 hours after disclosure, increasing breach risk.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results