The exploitation of the first Chrome zero-day of 2025 is linked to tools used in attacks involving Hacking Team’s new Dante ...
Contacted by SecurityWeek, Eugene, who appears to be from China, described Pwn2Own as an “amazing event”. The researcher said ...
ToolShell exploit activity surged last quarter, appearing in over 60% of Cisco Talos IR cases and driving a sharp rise in ...
Security firm Check Point warns about a 'YouTube Ghost Network' that circulated malware via 3,000+ videos that claimed to ...
Trust: As the example above highlights, even if a YouTube account has a large number of subscribers, that doesn't mean the content it posts is safe. A high follower count doesn't guarantee safety, and ...
Even if you're not a major corporation or government agency, find out how the massive F5 hack affects you and what to do right away.
Threat actors exploited a recently patched remote code execution vulnerability (CVE-2025-20352) in Cisco networking devices ...
On February 21, 2025, a group of hackers from North Korea pulled off the largest cryptocurrency heist in history after stealing $1.5 billion in Ethereum tokens from the Dubai-based cryptocurrency ...
Android devices are vulnerable to a new attack that can covertly steal two-factor authentication codes, location timelines, ...
Google’s October 2025 update has broken the Pixel IMS app, a tool many used to enable VoLTE and VoWiFi on imported Pixel phones in unsupported regions. The app exploited a loophole that allowed it to ...
Threat actors are actively exploiting a critical security flaw impacting the Service Finder WordPress theme that makes it possible to gain unauthorized access to any account, including administrators, ...
A new hacking competition called Zeroday Cloud, focused on open-source cloud and AI tools, announced a total prize pool of $4.5 million in bug bounties for researchers that submit exploits for various ...