Apple confirms hidden iOS 26 security update, and Google confirms silent iOS 18 spyware compromise. What you need to know and ...
A security flaw at the U.K.’s business registry, Companies House, exposed the personal information of business executives and ...
Leaked "DarkSword" exploits published to GitHub allow hackers and cybercriminals to target iPhone users running old versions ...
Security researchers have discovered DarkSword, a sophisticated exploit chain targeting iOS 18.4 through 18.7.2. Unlike past spyware aimed at high-profile targets, DarkSword is being surreptitiously ...
The Trivy vulnerability scanner was compromised in a supply-chain attack by threat actors known as TeamPCP, which distributed ...
Microsoft has confirmed that a hacker who successfully exploits a zero-day SQL vulnerability could gain system administrator privileges. Here’s how to fix it.
DarkSword packs both a complete iOS exploit chain and infostealer into one package. The chain initiates when Safari opens a ...
Chrome users face a new threat as VoidStealer 2.0 bypasses ABE protections and steals data during browser startup processes.
Blockchain security firm CertiK has released a detailed forensic breakdown of the March 10, 2026, exploit that drained roughly $242,000.
VEX helps public-sector security teams prioritize repairs by identifying which vulnerabilities affect their systems.
New approach to application security in production at 11 companies analyzes code behavior at runtime rather than relying on CVEs or external defenses. PALO ALTO, Calif., March 18, ...
Russia-linked APT28 has exploited a high-severity XSS vulnerability in Zimbra in attacks against Ukrainian entities.