From the FBI breach to the DarkSword iPhone exploit, these are the biggest cyber attacks and security failures that have ...
Stay ahead of the logs with our Monday Recap. We break down active Adobe 0-days, North Korean crypto stings, and critical CVEs you need to patch today ...
Adobe Acrobat and Reader users are under attack from hackers using a zero-day vulnerability. Update within 72 hours, Adobe ...
Hackers have been exploiting an Adobe Reader zero-day vulnerability since December 2025; PDF users are warned.
Now a security researcher says a Reader hole has been quietly exploited by malware for as long as four months, fingerprinting ...
Some of the most popular apps you have likely downloaded on your iPhone or Android smartphone are dangerous. And now the FBI is warning U.S. citizens to stop all such installs. The bureau’s new Public ...
Factory Reset Protection (FRP) is a vital anti-theft measure, yet it regularly irritates genuine buyers of used phones and repair shops. The main problem lies in a “cat-and-mouse game”: smartphone ...
Researchers have released a three-vulnerability exploit chain targeting Qualcomm's GBL on Android 16, enabling bootloader unlocking on Xiaomi 17 flagships. Researchers released a three-vulnerability ...
A vulnerability in Qualcomm’s Android Bootloader implementation allows unsigned code to run via the “efisp” partition on Android 16 devices. This is paired with a “fastboot” command oversight to ...
Qualcomm confirmed that fixes for the GBL exploit were provided to Android device makers earlier this month. The exploit, discovered by Xiaomi ShadowBlade Security Lab, was a key component in ...
A new Qualcomm GBL exploit is reportedly affecting Qualcomm SoCs, mainly the latest Snapdragon 8 Elite Gen 5. This enables bootloader unlocking on flagship phones that were previously difficult to ...
Ledger’s white-hat security team said it found a flaw in MediaTek's secure boot chain that can be used to steal sensitive information from certain Android devices. Update (March 19 at 11:51 am UTC): ...