North Korean hackers developed a new macOS malware kit, but were disrupted by a security researcher who exploited ...
The CPUID website was compromised, leading to popular Windows utilities such as CPU-Z and HWMonitor delivering multi-stage, ...
Hackers have been unsuccessfully targeting CVE-2023-33538, a vulnerability in discontinued TP-Link routers, for a year.
A critical Adobe Acrobat zero-day has been exploited for months via malicious PDFs to steal data and potentially take over ...
A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I ...
The BlueHammer Windows exploit leak highlights serious issues with Microsoft’s vulnerability disclosure process and security response. A newly leaked Windows ...
Chaotic Eclipse' released a PoC exploit for a zero-day flaw that allows for system takeover by a local user, citing an ...
Leaked "DarkSword" exploits published to GitHub allow hackers and cybercriminals to target iPhone users running old versions ...
Cybersecurity firm Kaspersky has detailed more of its findings on the distribution of malware through a zero-day exploit it uncovered in Google Chrome earlier this year. The exploit was executed ...
Drift Protocol, a decentralized cryptocurrency exchange (DEX), says the recent exploit against the platform was a six-month-long, highly coordinated attack. “The preliminary investigation shows that ...
Exclusive: Lab tests discover ‘new form of insider risk’ with artificial intelligence agents engaging in autonomous, even ‘aggressive’ behaviours ...
Google Chrome is generally thought of as a pretty safe browser to use, but that doesn’t make it an impenetrable fortress, and a Chrome exploit used to distribute malware is the latest proof of that. A ...