The nonprofit that oversees Wikipedia briefly enforced a 'read-only' mode on Thursday morning as users spotted code designed ...
The Wikimedia Foundation suffered a security incident today after a self-propagating JavaScript worm began vandalizing pages ...
According to new technical analyses from Google and mobile security firm iVerify, Coruna's technical core comprises five complete exploit chains and 23 distinct iOS vulnerabilities that ...
Security researchers discover the 'Coruna' exploit kit running on malicious Chinese websites that were able to secretly hack vulnerable iPhones running iOS 13 to 17.2.1.
Cybersecurity researchers have discovered a malicious Google Chrome extension that's designed to steal data associated with Meta Business Suite and Facebook Business ...
North Korea-linked hackers used fake Zoom calls to target a crypto firm. The attack deployed seven malware families to steal credentials and data. AI-driven deepfakes are increasing the efficiency of ...
Cyber threats are no longer coming from just malware or exploits. They’re showing up inside the tools, platforms, and ecosystems organizations use every day. As companies connect AI, cloud apps, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results