A previously undocumented set of 23 iOS exploits named "Coruna" has been deployed by multiple threat actors in targeted ...
CISA ordered U.S. federal agencies to patch three iOS security flaws targeted in cyberespionage and crypto-theft attacks using the Coruna exploit kit.
Exploitation of zero-days by commercial surveillance and spyware developers outpaced exploitation by nation-state actors last year, according to a report.
Crypto criminals are refining social engineering tactics to bypass traditional security tools, using fake venture capital outreach to deploy a technique known as ClickFix.
As physical, cyber, OT, and cloud systems converge, organizations must rethink risk across a unified threat surface—or risk leaving critical gaps that attackers are already ...
Cisco has handed security teams one of the largest ever patching workloads affecting its firewall products, including fixes ...
Nordic petrostate is preparing for war and turning the spotlight on vulnerabilities in its critical industries, as adversaries look for ways to damage the most important oil and gas producer to the EU ...
A Russian group used the exploit kit to target Ukrainians in 2025.
Researchers say a vulnerability in Perplexity’s Comet AI browser could expose local files and credentials through malicious calendar invites.
A weakness in the configuration of OAuth credentials opens up a stored XSS vulnerability in the n8n automation platform, ...
CVE-2021-22681, an old vulnerability affecting ICS products from Rockwell Automation, has been exploited in attacks.
Senator Ron Wyden and Representative Shontel Brown have called on the Government Accountability Office to examine whether ...