Thousands of iPhones were compromised using the Coruna exploit kit, which chained 23 iOS vulnerabilities into advanced attacks used for espionage and cybercrime.
The Google Threat Intelligence Group says it found an iPhone exploit kit that could crack the device and sniff out crypto wallets, apps and seed phrases to steal funds.
Cisco has handed security teams one of the largest ever patching workloads affecting its firewall products, including fixes ...
Security researchers say exploits used by governments to hack into iPhones have been found to be used by cybercriminals. They ...
UC Riverside computer scientists identify major security weaknesses in the Wi-Fi networks we rely on at work, at home, in airports, and in coffee shops, among other locations. Even the most advanced ...
Remember the WinRAR path handling exploit we reported on back in August? According to Google, that same flaw, officially dubbed CVE-2025-8088, is still being actively exploited, even though versions ...
Hacker interest is high in a days-old vulnerability in widely used web application framework React, with dozens of organizations already falling victim to it, cybersecurity experts warn. See Also: ...
If 2024 and 2025 were the years organisations felt the strain of tightening budgets, 2026 is the year those decisions will fully manifest in their cyber risk exposure. Across both the private and ...
Cyber threat actors have been exploiting a vulnerability in Gladinet’s Triofox, a file-sharing and remote access platform, and chained it with the abuse of the built-in anti-virus feature to achieve ...
Internet security remains a pressing issue. Mac users are no exception. Yahoo redirect virus is one of the most common threats in recent times. It may change browser settings. It may also redirect ...
Security researcher demonstrates how attackers can hijack Anthropic’s file upload API to exfiltrate sensitive information, even with network restrictions enabled. A newly disclosed vulnerability in ...
OpenAI’s Atlas browser is under scrutiny after researchers demonstrated how attackers can hijack ChatGPT memory and execute malicious code, without leaving traditional malware traces. Days after ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results