Aqua Security’s Trivy vulnerability scanner was compromised in a supply chain attack, leading to information-stealing ...
Apple confirms hidden iOS 26 security update, and Google confirms silent iOS 18 spyware compromise. What you need to know and ...
The Trivy vulnerability scanner was compromised in a supply-chain attack by threat actors known as TeamPCP, which distributed ...
Security researchers have discovered DarkSword, a sophisticated exploit chain targeting iOS 18.4 through 18.7.2. Unlike past spyware aimed at high-profile targets, DarkSword is being surreptitiously ...
Leaked "DarkSword" exploits published to GitHub allow hackers and cybercriminals to target iPhone users running old versions ...
A security flaw at the U.K.’s business registry, Companies House, exposed the personal information of business executives and ...
Microsoft has confirmed that a hacker who successfully exploits a zero-day SQL vulnerability could gain system administrator privileges. Here’s how to fix it.
DarkSword packs both a complete iOS exploit chain and infostealer into one package. The chain initiates when Safari opens a ...
Chrome users face a new threat as VoidStealer 2.0 bypasses ABE protections and steals data during browser startup processes.
VEX helps public-sector security teams prioritize repairs by identifying which vulnerabilities affect their systems.
Blockchain security firm CertiK has released a detailed forensic breakdown of the March 10, 2026, exploit that drained roughly $242,000.
Russia-linked APT28 has exploited a high-severity XSS vulnerability in Zimbra in attacks against Ukrainian entities.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results