Meta must face a lawsuit alleging that it secretly tracked Android users' browsing activity on mobile websites that embedded ...
OpenAI launches Daybreak to compete with Anthropic's Claude Mythos AI model in finding and fixing vulnerabilities in record ...
Intrusion Logging is a new part of Android’s Advanced Protection Mode, which aims to help protect human rights activists, ...
Samsung has locked down its phones in a big way, but a cybersecurity group has apparently gained root access to some Galaxy ...
Judean People's Front and People's Front of Judea go their own way ...
Threat actors are using three publicly available proof-of-concept exploits to attack Microsoft Defender and turn the security platform's primary cleanup and protection functions against organizations ...
A weekend hack that saw almost $300 million drained from a little-known crypto project has triggered a crisis of confidence among decentralized-finance investors, with users pulling billions of ...
Monday’s recap shows the same pattern in different places. A third-party tool becomes a way in, then leads to internal access. A trusted download path is briefly swapped to deliver malware. Browser ...
The cryptocurrency industry is facing a severe security crisis. In just under 20 days, digital asset platforms have lost more than $605 million to cyberattacks. The latest and most devastating ...
The $292 million exploit of Kelp DAO has set off a wave of reactions across the crypto industry, with developers and traders warning that the incident exposed deeper flaws in how decentralized finance ...
Hackers have broken into at least one organization using Windows vulnerabilities published online by a disgruntled security researcher over the last two weeks, according to a cybersecurity firm. On ...
Threat actors are exploiting three recently disclosed Windows security vulnerabilities in attacks aimed at gaining SYSTEM or elevated administrator permissions. Since the start of the month, a ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results