August 2015
Darkhotel – attack method hijacking hotel Wi-Fi connections and install spying software on target computers. Darkhotel also uses stolen certificates, social engineering techniques and a number of other zero-day vulnerabilities to steal confidential business information from targets.
June 2015
Adobe Systems Inc. today released an emergency update to fix a dangerous security hole in its widely-installed Flash Player browser plugin. The company warned that the vulnerability is already being exploited in targeted attacks, and urged users to update the program as quickly as possible. Read more
Recent Zero Day Attack was discovered by researchers from Indiana University and the Georgia Institute of Technology
Major Apple Zero Day Security Flaw in Mac OS and iOS which allows hackers to gain access to login credentials for Apple Keychain. This threat exposes consumers to the risk of zero day attack gaining access to iCloud, Mail, and web passwords stored in browsers such as Google Chrome. The 3rd party will be able to login to any system using Apple key chain if this threat was exploited.
The joint Indiana University and Georgia Institute of Technology research can be downloaded here.
Download Apple Zero Day Threat Research
Recent research from security firm Malwarebytes exposes the growing risk of Malvertising. Malvertising is defined as an infection vector that is exploited through the rise of real time bidding and ad exchanges being used to place online display advertising. By purchasing advertising through one of these exchanges a cyber-criminal can push malware directly onto end user computers.
Recently popular websites such as Huffington Post, Daily Motion, NY Daily News, About.com, and others have all be affected by this zero day attack. Consumers can mitigate their risk by increasing use of ad blocking technology such as Ad Block Plus
April 2015
Recent Zero Day Attack was discovered by security firm FireEye in April 2015
Operation Russian Doll created by the Russian hacker group ATP 28 targeted Adobe Flash. The exploit is triggered when a user visits a website controlled by ATP 28.
Adobe Flash is used in the majority of major websites and advertising networks thus the high vulnerability for either the business or consumer user.
How it works