Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Partner Summit 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom IBM Newsroom Ingram Micro ONE 2019 News Juniper NXTWORK 2019 News Lenovo Newsroom Lexmark Newsroom NetApp Insight 2019 News Cisco Live Newsroom HPE Zone Intel Tech Provider Zone

Top 5 Zero-Day Threats Of 2013

Attackers targeted previously unknown flaws in Internet Explorer, Adobe Flash and Reader, and Java, but security experts say businesses and solution providers should put zero-day threats into perspective.

Back 1   2   3   ... 6 Next

Zero-Day Attack Delivery Uses Various Methods

A spear-phishing campaign using a malicious file attachment or link is the most common method for delivering a zero-day attack. Cybercriminals carrying out an advanced persistent threat campaign often use common hacking techniques to gain an initial foothold.

Reports by IBM and F-Secure both identify the rise of watering hole attacks to deliver custom malware. The attackers compromise a trusted website that is commonly visited by targeted employees and set it up as an attack platform. Once visited, the custom malware targets the open flaw on the victim's machine, enabling attackers to gain an initial foothold into the organization. In the first half of 2013, security researchers tracked nearly a dozen zero-day exploits used in targeted attack campaigns. CRN put together a list of the top zero-day threats of 2013.

Back 1   2   3   ... 6 Next

sponsored resources