A Chrome flaw in the V8 engine, CVE-2025-10585, let hackers execute code for wallet drains and private key thefts. Google ...
For years, the Israeli spyware vendor NSO Group’s hacking tools have sparked fear and fascination throughout the international community. Such tools have been sold to authoritarian governments all ...
The US’s Cybersecurity and Infrastructure Security Agency has issued an emergency directive, calling the hacking campaign ...
A $5 million hack of the Ankr protocol on Dec. 1 was caused by a former team member, according to a Dec. 20 announcement from the Ankr team. The ex-employee conducted a “supply chain attack” by ...
Researchers exploit a SQLite memory corruption issue outside of a browser. LAS VEGAS – Researchers at Check Point have identified a new class of vulnerabilities targeting SQLite, outside the context ...
Hacking and cyber-espionage groups around the world are attempting to exploit recently disclosed zero-day vulnerabilities in Microsoft Exchange Server, before the window of opportunity closes as ...
A security researcher claimed that zero-click WiFi exploit is one of the most notorious iPhone hacks right now. This iOS flaw, he said, enables cybercriminals to control and access nearby iPhones, ...
Italian surveillance software maker Hacking Team recently claimed that it hasn’t lost any customers after the massive leak of its internal data two weeks ago. But it has lost at least one business ...
Over two months after Italian surveillance software maker Hacking Team had its internal data leaked by hackers, vendors are apparently still fixing zero-day exploits from the company’s arsenal. On ...
Italian surveillance software maker Hacking Team recently claimed that it hasn’t lost any customers after the massive leak of its internal data two weeks ago. But it has lost at least one business ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results