Security researchers say exploits used by governments to hack into Apple iPhones have been found used by cybercriminals. They ...
A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government.
Vulnerabilities in Anthropic’s Claude Code tool could have allowed attackers to silently gain control of a developer’s computer.
A 22-year-old Alabama man pleaded guilty to extortion, cyberstalking, and computer fraud charges after hijacking the social media accounts of hundreds of young women (including minors).
A Russian group used the exploit kit to target Ukrainians in 2025.
New York Magazine on MSN

The AI-Powered Hacking Spree Is Here

It turns out AI-coding tools are useful to criminals, too.
I'm done juggling 5 different chat apps ...
Teenage hackers are quietly reshaping cybercrime. They’re not movie-style geniuses, but persistent, socially connected, and often addicted—causing real harm through data breaches and feeding a cycle ...
A routine RDP brute-force alert led to unusual credential hunting and a geo-distributed VPN-linked infrastructure. Huntress Labs explains how one compromised login unraveled a suspected ...
This week, Finland's Aleksanteri Kivimäki sentenced. ShinyHunters breaches. Laptop farm rancher sentenced. Oregon state ...
Who would've thought that the humble and not-very-high-tech tire pressure monitoring system (TPMS) would be identified as vulnerability gateway?
Overview: AI companies face rising theft through model extraction, fake accounts, and stolen credentials.Research shows that model copying can achieve nearly 80 ...