Android is the world’s most widely used mobile OS—and a major target for malware. These are the top Android antivirus apps we ...
From the FBI breach to the DarkSword iPhone exploit, these are the biggest cyber attacks and security failures that have ...
LayerZero said Kelp’s DVN setup caused the $290 million exploit, as investors remain concerned about which protocol would take responsibility for the losses.
Serial-to-IP converters are affected by potentially serious vulnerabilities that can expose OT and healthcare systems to ...
Microsoft details a cross-tenant social engineering technique that tricks employees into granting remote access and enables ...
LayerZero said the attackers compromised two RPC nodes the company's verifier relied on and DDoS'd the rest, with the attack ...
DeFi's "worst year in terms of hacks," Ledger's CTO said, as the Kelp exploit shows how a single point of failure can cascade ...
Cybercriminals are increasingly using fake CAPTCHA prompts to trick users into enabling malware and scam notifications. Security experts warn the tactic is spreading rapidly through ads, pirated ...
The exploit, revealed last week by Google’s Threat Intelligence Group, is now publicly available on GitHub, increasing the urgency for older iPhones and iPads to run the latest available iOS and ...
LOS ANGELES, March 18, 2026 /PRNewswire/ -- CUJO AI, the global leader in network intelligence and cybersecurity solutions for network service providers (NSPs), today introduced network-level scam ...
A vulnerability in Qualcomm’s Android Bootloader implementation allows unsigned code to run via the “efisp” partition on Android 16 devices. This is paired with a “fastboot” command oversight to ...
Apple has virtually eliminated the remaining addressable iPhones being targeted by the Coruna exploit being traded around the black market — that is, if you update your iPhone. An exploit potentially ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results