Driving Towards Zero-Days: Hackers Take Turns Uncovering Exploits at Pwn20wn

Driving Towards Zero-Days: Hackers Take Turns Uncovering Exploits at Pwn20wn

Hackathon events like Pwn2Own Automotive 2024 play a crucial role in shedding light on zero-day attacks and significantly benefit security teams in several ways. These events bring together talented security researchers, ethical ...
Zero Day Summer is No Vacation

Zero Day Summer is No Vacation

"Zero-day Summer" refers to the period during summertime when cybercriminals take advantage of the vulnerabilities in software, applications, and computer systems that remain undetected and unpatched by security teams ...
Detecting the MOVEit Zero-Day: How MixMode AI Stays Ahead of Threats

Detecting the MOVEit Zero-Day: How MixMode AI Stays Ahead of Threats

We discuss a real-life example of a zero-day exploit, focusing on the MOVEit Transfer Software, and how MixMode can detect and mitigate such threats before they become widespread ...

Can Your Enterprise Cybersecurity Solution Solve These Two Challenges? You May Be More Vulnerable Than You Realize

Of all the challenges facing the modern SOC, two stand out among the most persistent and difficult to overcome: an overwhelming volume of false positive alerts and an alarming escalation in zero-day ...

Zero-day Exploit Discoveries Hit Record Numbers in 2021

The number of zero-day exploit discoveries hit record numbers in 2021, according to Google Project Zero. Instances of “in-the-wild 0-days” were up nearly double versus 2020, when only 25 0-day exploits were ...

Log4j: the Latest Zero-Day Exploit to Log Jam Cybersecurity

Log4j is the latest example of a zero-day exploit to be discovered and put a big part of the industry into chaos. Given its wide adoption by developers, the impact of the ...

What is Zero-Day Attack Identification?

Zero-day attacks are among the most challenging Cybersecurity threats SOC teams face on a regular basis. These “never before seen” threats can surprise organizations even if they are protected by traditional Cybersecurity ...