Đinh Văn MạnhforFIS Securityblog.fiscybersec.com·Dec 7, 2024Lỗ hổng zero-day trên Windows: Nguy cơ lộ thông tin NTLMMột lỗ hổng zero-day mới đã được phát hiện, cho phép kẻ tấn công thu thập thông tin xác thực NTLM chỉ bằng cách lừa mục tiêu xem một tệp độc hại trong Windows Explorer. Lỗ hổng này được phát hiện bởi nhóm 0patch, một nền tảng cung cấp hỗ trợ không ch...DiscussNewslettersthreat intelligence
Code Skycodesky.cloudhero.in·Oct 16, 2024Understanding Zero-Day Vulnerability: A Simple GuideIn today’s digital world, where we rely on technology for almost everything, security is a big concern. One major security risk is called a zero-day vulnerability. It might sound like technical jargon, but it’s important to understand how it works an...Discusszero_day_vulnerability
ABHIMANYUSINGH SISODIYAhackabhi.hashnode.dev·Aug 14, 2024Zero-Day Vulnerability!!Understanding Zero-Day Vulnerabilities: The Silent Threat to Cybersecurity In the intricate and ever-evolving world of cybersecurity, few terms evoke as much concern and urgency as "zero-day vulnerabilities." These elusive and often devastating flaws...Discussvulnerability-awareness
ValentinoZAtechlogic.hashnode.dev·Jan 16, 2024ALERT: Immediate Action Required – Update Google Chrome Now to Address Zero-Day VulnerabilityGoogle has released security updates to fix the first Chrome zero-day vulnerability exploited in the wild since the start of the year. "Google is aware of reports that an exploit for CVE-2024-0519 exists in the wild," the company said in a security a...Discuss·39 readszero_day_vulnerability
Awais Sajidblackdiamond.hashnode.dev·Jan 12, 2024ZERO-Day Exploits and Automations0-Day exploits How to automate hacking using the cloud and Telegram Step 1: We are not using any paid services for this automation. Step 2: We use Google Cloud Shell to open a terminal. Step 3: Get a list of your targets from different hacking progra...Discussbugbounty
Ohekpeje Joel Odeyjoelodey.hashnode.dev·Oct 17, 2023Newly Discovered Zero-Day AttacksA zero-day attack is a cyberattack that exploits a software vulnerability that is previously unknown to the vendor. This means that there is no patch or mitigation available at the time of the attack, making it very difficult to defend against. What ...Discuss·10 likeszero_day_vulnerability
Aishwarya Jagadishaishwarya21.hashnode.dev·Sep 17, 2023Unmasking the Unseen: How Machine Learning Uncovers Zero-Day VulnerabilitiesIn today's digital landscape, cybersecurity threats are constantly evolving, and one of the most concerning challenges for organizations is dealing with zero-day vulnerabilities. Zero-day vulnerabilities are software weaknesses exploited by cybercrim...Anusha Shanbhog and 2 others are discussing this3 people are discussing thisDiscuss·18 likes·65 readsMachine Learning
balaji ramarajanthe-paacs.hashnode.dev·Sep 10, 2023Zero Trust Security — a Cautious moveWe are all living in a Trust Free world where there is no concept of Trust worthiness, Moral Values & Self Discipline, the need of the hour is Zero Trust Security Architecture (ZTSA) for the Intra and Inter enterprise transactions / Interactions. Wit...Discusszerotrust