Threats

The Symantec Security Threat and Response (STAR) team monitors more than 63 million attack sensors to deliver the most comprehensive threat data in the world.

Security Articles

How Secure Are You?

GET CHECKLIST

81 Million
XXX Major Threats Averted Q1 2017

Types of Malware, as of April 2017

Annual Threat Report

Get the Internet Security Threat Report (ISTR)

DOWNLOAD REPORT

Security Threats and Response (STAR) Intelligence

STAR Report: Highlights

Data Accidentally Exposed

Data Accidentally Exposed

Users of online dating site, Soulmates, got sexually explicit spam after data leak at British publication, The Guardian. Human error at fault.

Election Hacked

Election Hacked

Symantec Internet Security Threat Report examines how #cyberattacks driven by subversion and sabotage came to the fore in 2016.

Connected Devices in Danger

Connected Devices in Danger

The Hajime worm appears to be the work of a white hat hacker attempting to wrestle control of IoT devices from Mirai and other malicious threats.

REAL-TIME THREAT MONITORING

Guide to Zero-Day Exploits

While you’ve taken steps to secure your network and sensitive data, you’re still at risk of a Zero-Day vulnerability. Maybe you’ve heard the term before but don’t have a deep understanding of how Zero-Day exploits work. Or perhaps, you know about Zero-Day exploits but need actionable insights on how to prevent them.

 

This guide provides an overview of Zero-Day exploits, how they happen, how to detect and identify a Zero-Day attack, and ways you can protect your organization.

 

The Basics: What is a Zero-Day exploit?

A Zero-Day exploit is an undisclosed application vulnerability that could be exploited to negatively affect the hardware, applications, data or network. The term “Zero-Day” refers to the fact that the developers have “zero” days to fix a problem that has just been exposed and may have been already exploited. Hackers seize on that security vulnerability to launch a cyber attack on the same day a weakness is discovered. Basically, the vulnerability is exploited before a fix becomes available.

REAL-TIME THREAT MONITORING

Security Updates

COMPLETE WEBSITE SECURITY

Security For The Smarter Enterprise

  • Unbreakable Protection
  • Vulnerability Assessment
  • Malware Scanning

MORE ABOUT COMPLETE WEBSITE SECURITY   

USE CASES

Symantec Website Security Solutions In The Real World

Small Business eCommerce

Timeless Wrought Iron brings trust to their customers' high-value online purchases

eCommerce

Papercheck turns to Symantec for Symantec Secure Site SSL/TLS with EV and experiences a 87 percent higher registration rate

VIEW ALL USE CASES   

Join the Community

Join Security Discussions on Symantec Connect

SYMANTEC CONNECT

Follow Threat Intelligence on Twitter @ThreatIntel

SYMANTEC ON TWITTER

Watch Videos on the Symantec Website Security YouTube Channel

SYMANTEC ON YOUTUBE