Zero-day attacks have become a significant concern in the realm of cybersecurity, posing a formidable challenge to individuals and organizations alike. These attacks exploit vulnerabilities that are ...
AIs can create complex zero-day exploits. The consequence: The search for security vulnerabilities is successfully industrialized and scaled.
VulnCheck analysts found that vulnerabilities exploited before being publicly disclosed rose from 23.6% in 2024 to 28.96% in 2025 ...
Zero-trust architecture is designed to defend against known threats, yet it often falls short when faced with unknown vulnerabilities. As cyber-attacks occur every 39 seconds, the static nature of ...
A hole in Microsoft Office is being exploited by bad actors, including Russian hackers targeting Ukraine's government.
Microsoft released patches for CVE-2026-21509, a new Office zero-day vulnerability that can be exploited to bypass security ...
Microsoft releases an urgent out-of-band update for a critical Office zero-day flaw already exploited in real-world attacks.
On the second day of Pwn2Own Automotive 2026, security researchers collected $439,250 in cash awards after exploiting 29 unique zero-days. The Pwn2Own Automotive hacking contest focuses on automotive ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results