To exploit the vulnerability, an attacker would need either system access or be able to convince a user to open a malicious ...
Hackers collect $439,250 after exploiting 29 zero-day vulnerabilities on the second day of Pwn2Own Automotive 2026.
A security breach tied to decentralized exchange aggregator Matcha Meta has resulted in the theft of roughly $16.8 million in crypto assets, adding to a growing list of smart-contract exploits that ...
Threat actors are exploiting misconfigured web applications used for security training and internal penetration testing, such ...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) picked up on an ongoing VMware flaw affecting the software’s centralized management utility. CISA added the flaw, designated as ...
AIs can create complex zero-day exploits. The consequence: The search for security vulnerabilities is successfully industrialized and scaled.
Microsoft releases an urgent out-of-band update for a critical Office zero-day flaw already exploited in real-world attacks.
The hype around the exploits of centralized digital asset exchanges (CEX) and democratized digital asset exchanges (DEX) ...
While telnet is considered obsolete, the network protocol is still used by hundreds of thousands of legacy systems and IoT ...
WEF 2026 report: 87% of executives identify AI vulnerabilities as fastest-growing cyber risk. Data leaks now outweigh ...
Grubhub data breach confirmed as sources say ShinyHunters group allegedly demands Bitcoin payment to prevent release of ...
Saga has paused its SagaEVM chainlet after a bad actor exploited the chain to drain $7 million in stablecoins before converting them into Ether.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results