The US’s Cybersecurity and Infrastructure Security Agency has issued an emergency directive, calling the hacking campaign ...
A Chrome flaw in the V8 engine, CVE-2025-10585, let hackers execute code for wallet drains and private key thefts. Google ...
Researchers exploit a SQLite memory corruption issue outside of a browser. LAS VEGAS – Researchers at Check Point have identified a new class of vulnerabilities targeting SQLite, outside the context ...
Hacking and cyber-espionage groups around the world are attempting to exploit recently disclosed zero-day vulnerabilities in Microsoft Exchange Server, before the window of opportunity closes as ...
Researchers sifting through 400GB of data recently leaked from Hacking Team, an Italian company that sells computer surveillance software to government agencies from around the world, have already ...
A security researcher claimed that zero-click WiFi exploit is one of the most notorious iPhone hacks right now. This iOS flaw, he said, enables cybercriminals to control and access nearby iPhones, ...
FearsOff CEO Marwan Hachem told Cointelegraph that timelocks, hardcoded caps and better audits could have prevented the ...
Each year, the Zero Day Initiative hosts a "Pwn2Own" hacking contest where security researchers can earn money for finding serious vulnerabilities in major platforms like Windows and macOS. This 2021 ...
Italian surveillance software maker Hacking Team recently claimed that it hasn’t lost any customers after the massive leak of its internal data two weeks ago. But it has lost at least one business ...
An American cybersecurity company was behind a 2016 iPhone hack sold to a group of mercenaries and used by the United Arab Emirates. When the United Arab Emirates paid over $1.3 million for a powerful ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results