Thousands of iPhones were compromised using the Coruna exploit kit, which chained 23 iOS vulnerabilities into advanced attacks used for espionage and cybercrime.
Lockdown mode is looking increasingly necessary, although Apple has secured its systems against this iPhone-hacking exploit in iOS 26.
The zero-day that Google has included in the March Android security bulletin, and cybersecurity experts have warned could enable an attacker to bypass security controls and assume device control.
You may or may not be reading this on a smartphone, but odds are that even if you aren’t, you own one. Well, possess one, ...
According to new technical analyses from Google and mobile security firm iVerify, Coruna's technical core comprises five complete exploit chains and 23 distinct iOS vulnerabilities that ...
Security researchers discover the 'Coruna' exploit kit running on malicious Chinese websites that were able to secretly hack vulnerable iPhones running iOS 13 to 17.2.1.
Verify has described the activity as the “first known mass iOS attack” campaign of its kind. Google said fragments of the exploit first appeared last February, with ties to an unnamed “customer of a ...
Google expands Gemini-powered scam detection to Samsung Galaxy S26 and more Android devices, bringing on-device AI fraud protection to calls and messages.
A new phishing campaign is impersonating Google’s account security checks to trick users into installing a malicious web app that steals passwords, passcodes, and other sensitive data directly from ...
It looks like a cute little dolphin-themed toy, but the Flipper Zero is a surprisingly powerful learning tool for hacking.
Some TV apps let you watch programming with fewer ads, as long as you allow your TV to participate in a global proxy network.
Zero-day exploits, AI-driven Android malware, firmware backdoors, password manager trust gaps, rising DDoS define this week’s critical cyber threats.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results