Google researchers have reportedly uncovered a powerful iOS exploit kit in iPhones that cybercriminals are now using in ...
Google has issued an urgent security update for its Chrome browser to address multiple vulnerabilities that could expose users to cyberattacks, including flaws capable of enabling remote code ...
Google and iVerify researchers say the case points to a thriving secondary market for high-end zero-day exploits.
Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities actively exploited throughout 2025, almost half ...
The iPhone crypto exploit Coruna targets outdated iOS devices, stealing wallet seed phrases through compromised sites, enabling crypto theft.
Instances of generative AI-assisted hacking are on the rise, and the threat of cyberattacks from bots acting on their own is no longer science fiction. With AI doing their bidding, novices can cause ...
Google's security team exposes Coruna exploit kit targeting iPhones running iOS 13-17.2.1 to steal crypto wallets. Update now ...
The Coruna exploit kit has 23 exploits targeting iOS devices, previously used in Russian attacks and now in cybercrime ...
Exploitation of the command injection flaw in VMware Aria Operations could grant an attacker broad acess to victims' cloud environments.
NEW YORK, March 4, 2026 /PRNewswire/ — The industry must pivot to Preemptive Defense: As agentic tools like Claude Code enable attackers to scan and exploit vulnerabilities at machine speed, a ...
A previously undocumented set of 23 iOS exploits named "Coruna" has been deployed by multiple threat actors in targeted ...
Researchers said a sophisticated exploit kit with 23 iOS vulnerabilities is being used by espionage and cybercrime campaigns.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results