Thousands of iPhones were compromised using the Coruna exploit kit, which chained 23 iOS vulnerabilities into advanced ...
The Wikimedia Foundation suffered a security incident today after a self-propagating JavaScript worm began vandalizing pages ...
The nonprofit that oversees Wikipedia briefly enforced a 'read-only' mode on Thursday morning as users spotted code designed ...
Authorities dismantle Tycoon 2FA phishing service linked to 64,000 attacks, millions of emails, and breaches at nearly ...
A Chrome extension named "QuickLens - Search Screen with Google Lens" has been removed from the Chrome Web Store after it was ...
The Coruna exploit kit has 23 exploits targeting iOS devices, previously used in Russian attacks and now in cybercrime ...
A developer-targeting campaign leveraged malicious Next.js repositories to trigger a covert RCE-to-C2 chain through standard ...
Linked to North Korean fake job-recruitment campaigns, the poisoned repositories are aimed at establishing persistent C2 ...
Researchers with Truffle Security are warning that old and seemingly benign Google API keys might now be weaponized by threat ...
Chrome CVE-2026-0628 let malicious extensions hijack Gemini panel for privilege escalation, local file access, and ...
Security researchers have uncovered a hacking toolkit designed to compromise Apple iPhones and steal cryptocurrency wallet ...
Project initiated by Nuxt lead Daniel Roe attracts wide support thanks to multiple issues with the official interface A new ...