Thousands of iPhones were compromised using the Coruna exploit kit, which chained 23 iOS vulnerabilities into advanced attacks used for espionage and cybercrime.
Cisco has handed security teams one of the largest ever patching workloads affecting its firewall products, including fixes for two ‘perfect 10’ vulnerabilities in the company’s Secure Firewall ...
Google has issued an urgent security update for its Chrome browser to address multiple vulnerabilities that could expose users to cyberattacks, including flaws capable of enabling remote code ...
Google and iVerify researchers say the case points to a thriving secondary market for high-end zero-day exploits.
Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities actively exploited throughout 2025, almost half ...
The iPhone crypto exploit Coruna targets outdated iOS devices, stealing wallet seed phrases through compromised sites, enabling crypto theft.
Operational penetration testing is a process of simulating real-world attacks on OT systems to identify vulnerabilities before cybercriminals can exploit them, either physically or remotely. OT ...
Instances of generative AI-assisted hacking are on the rise, and the threat of cyberattacks from bots acting on their own is no longer science fiction. With AI doing their bidding, novices can cause ...
Ox Security warns that Mail2Shell could enable threat actors to hijack FreeScout systems without user interaction ...
Coruna exploit kit chained 23 iOS vulnerabilities to hack older iPhones. Researchers say the toolkit shifted from ...