zero-day exploit
-
National security: cyberwarfare methodology and case studies
In the context of evolving modern conflicts, cyberwarfare methodologies have become a powerful tool in the arsenal of states, hacktivists and cybercriminals. This paper provides a comprehensive analysis of the methodologies employed in the field of cyber warfare. By delving into techniques, strategies and tactics, we aim to reveal the multifaceted nature of cyber warfare.
-
Google security report reveals more than 60 0day used for commercial spyware
More than 60 zero-day vulnerabilities (0day) that have been made public since 2016 are associated with commercial spyware vendors for government agencies, and vulnerabilities exist in products from a number of companies, including Apple, Adobe, Google, and others, where they have been used for attack purposes including targeting journalists and political dissidents. The report notes that a large number of vulnerabilities are actively exploited in 2023.