Thousands of iPhones were compromised using the Coruna exploit kit, which chained 23 iOS vulnerabilities into advanced attacks used for espionage and cybercrime.
Google and iVerify researchers say the case points to a thriving secondary market for high-end zero-day exploits.
Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities actively exploited throughout 2025, almost half of them in enterprise software and appliances.
The iPhone crypto exploit Coruna targets outdated iOS devices, stealing wallet seed phrases through compromised sites, enabling crypto theft.
CISA adds VMware Aria Operations command injection flaw CVE-2026-22719 to KEV after reports of active exploitation; patches released by Broadcom.
Networking giant Cisco has released 25 joint security advisories covering security patches for 48 vulnerabilities in across its Secure Firewall Adaptive Security Appliance (ASA), Secure Firewall ...
Walk past a shiny sticker on a wall, scan it quickly, and boom — a problem starts growing quietly inside a phone. QR codes ...
Text message two-factor authentication sounds like a security upgrade. It feels official. It looks responsible. Yet it often ...
For cybercriminals, the cost-benefit ratio must also be right, as Cloudflare notes in its Threat Report 2026. Stolen ...
This week, Cisco patches and hacks. Trojanized app targeted Israelis. Bye-bye, Tycoon 2FA. Also bye-bye LeakBase. A LexisNexis breach. Woman sentenced for ...
Google has issued an urgent security update for its Chrome browser to address multiple vulnerabilities that could expose users to cyberattacks, including flaws capable of enabling remote code ...
Security researchers demonstrated that any browser extension can secretly install malware by modifying downloaded files without requiring additional permissions or triggering warnings.