dcsimg

A zero-day guide for 2020: Recent attacks and advanced preventive techniques

Zero-day vulnerabilities enable threat actors to take advantage of security blindspots. Typically, a zero-day attack involves the identification of zero-day vulnerabilities, creating relevant exploits, identifying vulnerable systems, and planning the attack. The next steps are infiltration and launch.  This article examines three recent zero-day attacks, which targeted Microsoft, Internet … [Read more...]

Chromium-Based Microsoft Edge Browser Released

Chrome is the most popular browser in the world, according to ComputerWorld. Two years ago, Microsoft announced that it would move its Microsoft Edge browser over to Chromium, the open-source foundation on which Chrome is based. That effort has finally come to fruition with the release of a new version of Microsoft Edge, available for Windows (10, 8 and 7), macOS®, … [Read more...]

Drive-by download campaign targets Chinese websites, experiments with exploits

During our web crawls we sometimes come across bizarre findings or patterns we haven’t seen before. This was the case with a particular drive-by download attack planted on Chinese websites. While by no means advanced (it turned out to be fairly buggy), we witnessed a threat actor experimenting with several different exploits to drop malware. For years we have cataloged thousands of Chinese … [Read more...]