Thousands of iPhones were compromised using the Coruna exploit kit, which chained 23 iOS vulnerabilities into advanced attacks used for espionage and cybercrime.
The nonprofit that oversees Wikipedia briefly enforced a 'read-only' mode on Thursday morning as users spotted code designed ...
Curious about split keyboards, but overwhelmed by the myriad options for every little thing? You should start with ...
A U.S. government contractor's son, accused of stealing more than $46 million in cryptocurrency from the U.S. Marshals ...
Instances of generative AI-assisted hacking are on the rise, and the threat of cyberattacks from bots acting on their own is no longer science fiction. With AI doing their bidding, novices can cause ...
Security researchers have uncovered a hacking toolkit designed to compromise Apple iPhones and steal cryptocurrency wallet ...
A maximum severity vulnerability in the FreeScout helpdesk platform allows hackers to achieve remote code execution without any user interaction or authentication.
Authorities say LeakBase was "one of the world’s largest online forums for cybercriminals," and maintained an archive of ...
Researchers said a sophisticated exploit kit with 23 iOS vulnerabilities is being used by espionage and cybercrime campaigns.
Bounty-hunting became mainstream in 2012 with Bugcrowd and HackerOne. These were followed by, for example, YesWeHack (2015) ...
According to new technical analyses from Google and mobile security firm iVerify, Coruna's technical core comprises five complete exploit chains and 23 distinct iOS vulnerabilities that ...
Security researchers discover the 'Coruna' exploit kit running on malicious Chinese websites that were able to secretly hack vulnerable iPhones running iOS 13 to 17.2.1.