Microsoft Exchange users are urged to mitigate a zero-day vulnerability that CISA has confirmed is under active exploitation.
The Bitcoin DeFi project Echo fell victim to an exploit. The hacker minted 1k eBTC on Monad, and then collateralized 45 eBTC ...
A cybersecurity researcher has released a proof-of-concept exploit for a Windows privilege escalation zero-day dubbed ...
A zero-day exploit circulating online allows people with physical access to a Windows 11 system to bypass default BitLocker ...
On May 18, an attacker drained approximately $11.5 million from the Verus-Ethereum bridge using a forged Merkle proof. This ...
Microsoft Windows 11 has fallen victim to three zero-day exploits in a single day as the 2026 Pwn2Own hacking event opens in ...
Google says hackers used AI to help build a zero-day exploit targeting 2FA, raising concerns about AI-assisted hacking.
The team behind the first public macOS kernel memory corruption exploit on M5 silicon has shared fresh details on how Mythos Preview helped bypass a five-year Apple security effort in five days.
A powerful iPhone hacking toolkit that researchers say may have originated as a U.S.-built capability has surfaced in the hands of foreign espionage actors and financially motivated criminal groups, ...
Google said Monday that it had disrupted a criminal group’s attempt to use artificial intelligence to exploit another company ...
A new Linux zero-day exploit, named Dirty Frag, allows local attackers to gain root privileges on most major Linux ...
For the first time, Google has identified a zero-day exploit believed to have been developed using artificial intelligence.