Google and other cybersecurity companies, including iVerify and Lookout, have identified a new iPhone hacking technique. This ...
Trivy attack force-pushed 75 tags via GitHub Actions, exposing CI/CD secrets, enabling data theft and persistence across developer systems.
Langflow CVE-2026-33017 exploited in 20 hours after disclosure, enabling RCE via exec(), exposing systems before patching cycles.
A massive data breach tied to automotive marketplace CarGurus has exposed approximately 12.4 million user records, with new details pointing to a targeted social engineering attack rather than a ...
Apple is encouraging people to update their iPhones after research pointed to vulnerabilities in older versions of the iOS operating system.
A powerful iPhone-hacking technique known as DarkSword has been discovered in use by Russian hackers. It can take over ...
The hacker group calls itself ByteToBreach and claims to have stolen a large dataset from CGI’s Swedish division, including source code.
The European Union sanctioned three Chinese and Iranian hacking operations that have been under U.S. indictments or sanctions ...
Be careful telling AI agents how to act, since they might end up hacking their way to an end goal. Agents assigned routine ...
A cyber attack that continues to impact the Stryker medtech group's business operations as of this writing has been linked to a pro-Palestine hacking group thought to be supported by the Iranian ...
IBM researchers discovered an autonomously coded backdoor that they called unsophisticated but nonetheless ominous.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results