Thousands of iPhones were compromised using the Coruna exploit kit, which chained 23 iOS vulnerabilities into advanced attacks used for espionage and cybercrime.
Lockdown mode is looking increasingly necessary, although Apple has secured its systems against this iPhone-hacking exploit in iOS 26.
A China-linked advanced persistent threat actor tracked as UAT-9244 has been targeting telecommunication service providers in South America since 2024, compromising Windows, Linux, and network-edge ...
Enterprise software was a major focus of zero-day activity during 2025, with security and networking devices, like firewalls, ...
With our embrace of smart technology, we have collectively traded safety for comfort, making ourselves vulnerable to hackers.
Hackers are exploiting a critical vulnerability in the User Registration & Membership plugin, which is installed on more than ...
LeakBase, a forum for global hackers with over a hundred thousand members, has been seized by the United States Department of Justice (DoJ). "The forum had an enormous and continuously updated archive ...
There’s just something delightful about scaled items. Big things shrunk down, like LEGO’s teeny tiny terminal brick? Delightful. Taking that terminal brick and scaling it back to a ...
Bounty-hunting became mainstream in 2012 with Bugcrowd and HackerOne. These were followed by, for example, YesWeHack (2015) ...
A pair of US lawmakers are calling for an investigation into how easily spies can steal information based on devices’ electromagnetic and acoustic leaks—a spying trick the NSA once codenamed TEMPEST.
A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government.
Gary McKinnon, who prosecutors said committed "the biggest military computer hack of all time," claims he has seen UFO images and "non-terrestrial" data ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results