An N-day vulnerability in Microsoft Word exposes nearly 14 million assets. Attackers can exploit this flaw to bypass security prompts, enabling deployment of malware and establishing persistent access ...
CISA has ordered U.S. government agencies to secure their servers against an actively exploited vulnerability in the Zimbra Collaboration Suite (ZCS).
The DarkSword iOS exploit chain was used by the Russian APT behind the Coruna exploit in attacks targeting Ukraine.
Researchers from Google LLC and two cybersecurity companies have identified a set of zero-day exploits in iOS 18. Google’s GTIG threat intelligence team, Lookout Inc. and iVerify Inc. published their ...
Ocean Network today announced the official Beta launch of its decentralized peer-to-peer (P2P) compute orchestration layer.
A cryptocurrency scam known as "ShieldGuard" has been dismantled after researchers identified it as a malicious browser extension designed to harvest sensitive user data. The operation, uncovered by ...
This is the first Background Security Improvement from Apple. Here's how to make sure your iPhone installs it right away.
A researcher has discovered another method to bypass WhatsApp’s View Once feature, but Meta does not plan to patch it.
Interlock ransomware is actively exploiting CVE-2026-20131 (CVSS 10.0) in Cisco FMC, enabling unauthenticated remote code execution as root.
Cloudflare hopes for EU action. Cloudflare said it met with AGCOM in 2024 to discuss Piracy Shield’s flaws and proposed different methods “that wouldn’t break the Internets ...
Stop settling for default settings. These five advanced tips help you take full control of your VPN, optimizing how it secures your data and manages your connection.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results