Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Zone Intel Partner Connect Digital Newsroom Dell Technologies World Newsroom Dell Technologies Newsroom HP Reinvent 2020 Newsroom IBM Newsroom The IoT Integrator Lenovo Newsroom NetApp Data Fabric Intel Tech Provider Zone

Top 5 Zero-Day Threats Of 2013

Attackers targeted previously unknown flaws in Internet Explorer, Adobe Flash and Reader, and Java, but security experts say businesses and solution providers should put zero-day threats into perspective.

Back 1   2   3   ... 6 Next

photo
Zero-Day Attack Delivery Uses Various Methods

A spear-phishing campaign using a malicious file attachment or link is the most common method for delivering a zero-day attack. Cybercriminals carrying out an advanced persistent threat campaign often use common hacking techniques to gain an initial foothold.

Reports by IBM and F-Secure both identify the rise of watering hole attacks to deliver custom malware. The attackers compromise a trusted website that is commonly visited by targeted employees and set it up as an attack platform. Once visited, the custom malware targets the open flaw on the victim's machine, enabling attackers to gain an initial foothold into the organization. In the first half of 2013, security researchers tracked nearly a dozen zero-day exploits used in targeted attack campaigns. CRN put together a list of the top zero-day threats of 2013.

 
 
Back 1   2   3   ... 6 Next

sponsored resources