PCWorld reports on the ‘BlueHammer’ zero-day vulnerability that allows attackers to potentially take over Windows computers through privilege escalation. A frustrated security researcher published the ...
Drift Protocol said with “medium-high confidence” that the recent attack was carried out by the same actors responsible for the $58 million Radiant Capital hack in October 2024. Drift Protocol, the ...
The Coruna exploit kit is an evolution of the framework used in the Operation Triangulation espionage campaign, which in 2023 targeted iPhones via zero-click iMessage exploits. The software has been ...
A new iOS exploit chain is being used by attackers around the globe, and it's built for espionage actors and financially motivated attackers alike. Google, iVerify, and Lookout this week published ...
BitLocker is a security feature that helps you encrypt your drives. Whether it is your hard drive, an external USB drive, or multiple hard drives, you can encrypt them with BitLocker. You can find ...
Google's Threat Intelligence Group (GTIG) has a new report out about a powerful iOS exploit kit called "Coruna," which traveled from a surveillance vendor's customer to a Russian espionage group to ...
Hackers Used New Exploit Kit to Compromise Thousands of iPhones Your email has been sent An iOS exploit framework has revealed how advanced mobile attack tools can move rapidly from surveillance ...
This voice experience is generated by AI. Learn more. This voice experience is generated by AI. Learn more. Updated February 19 with further analysis from cybersecurity experts following an update now ...
Microsoft confirmed it can hand over BitLocker recovery keys stored in the cloud under warrant, reviving debate over who controls encrypted data. Image: Simon Ray/Unsplash Microsoft is under scrutiny ...
A critical command injection issue in Fortinet FortiSIEM has been disclosed along with public exploit code, and researchers claim attackers could have been remotely achieving unauthenticated root ...
This happened before, and it happened again: Windows PCs are booting into BitLocker Recovery after the recent security updates. Microsoft acknowledged the issue and confirmed BitLocker bugs after the ...
Oracle has silently fixed an Oracle E-Business Suite vulnerability (CVE-2025-61884) that was actively exploited to breach servers, with a proof-of-concept exploit publicly leaked by the ShinyHunters ...