Researchers said a sophisticated exploit kit with 23 iOS vulnerabilities is being used by espionage and cybercrime campaigns.
According to new technical analyses from Google and mobile security firm iVerify, Coruna's technical core comprises five complete exploit chains and 23 distinct iOS vulnerabilities that ...
Security researchers discover the 'Coruna' exploit kit running over malicious Chinese websites that were able to secretly hack vulnerable iPhones running iOS 13 to 17.2.1.
By testing agent-to-agent interactions, researchers observed catastrophic system failures. Here's why that's bad news for everyone.
An MCP (Model Context Protocol) server that gives AI assistants access to the Exploit Intelligence Platform — 370K+ vulnerabilities and 105K+ exploits from NVD, CISA KEV, EPSS, ExploitDB, Metasploit, ...
A handful of European government agencies have been compromised by hackers in recent weeks, thanks to a new round of critical vulnerabilities in an Ivanti product — and it's another grim reminder of ...
It’s a familiar moment in math class—students are asked to solve a problem, and some jump in confidently while others freeze, unsure where to begin. When students don’t yet have a clear mental model ...
Microsoft has rolled out fixes for security vulnerabilities in Windows and Office, which the company says are being actively abused by hackers to break into people’s computers. The exploits are ...
After completing a degree in Film, Television, and Cultural Studies at Manchester Metropolitan University, I decided to pursue my love of writing and video games by entering the world of video game ...
This repository documents an educational reproduction of CVE-2025-6019 performed in a controlled lab environment (Ubuntu VM, non-production). This research reproduces CVE-2025-6019 in a sandboxed ...
Arc Raiders‘ item duplication bug has been hotfixed by the developer, preventing players from producing massive quantities of certain items through unintended behavior. The extraction shooter’s item ...
Cybersecurity researchers have called attention to a "massive campaign" that has systematically targeted cloud native environments to set up malicious infrastructure for follow-on exploitation. The ...