article thumbnail

CVE-2023-41064, CVE-2023-4863, CVE-2023-5129: Frequently Asked Questions for ImageIO and WebP/libwebp Zero-Day Vulnerabilities

Tenable

On September 7, researchers at Citizen Lab published a blog post detailing their discovery of an iPhone zero-click, zero-day exploit chain in Apple iOS used to deploy a spyware known as Pegasus. ImageIO or Image I/O is a framework that allows programs to read and write image file formats, including WebP. What is WebP or libwebp?

article thumbnail

Improving IT Security in a World Filled With Hackers

Samanage

In fact, careful consideration must be built into the designing or selecting of software architecture as a crucial step in product development and implementation. IT strategy that champions improving IT security requires that secure programming standards and methodologies be employed to reduce vulnerabilities in the resulting software.

Spyware 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Future of Security

O'Reilly Media - Ideas

We’ll start with zero trust, a critical element for any security program in this age of sophisticated and targeted cyberattacks. The technology landscape is witnessing an emergence of security vendors rethinking the efficacy of their current security measures and offerings without businesses needing to rebuild entire architectures.

Mobile 103
article thumbnail

The Top 5 Mobile Security Threats and How to Mitigate Them

Palo Alto Networks

Mobile Malware: Every website visited or link clicked has the potential to infect mobile devices with malware, such as spyware, ransomware, Trojan viruses, adware and others. Spear phishing is also a rising threat as hackers target specific employees or organizations through mobile devices in order to gain access to sensitive data. .

Mobile 11