A researcher found a hidden flaw in Google's Gemini AI that lets invisible text commands alter responses, but Google refuses ...
Oracle fixes another security flaw that Clop hackers were using to steal sensitive personal information about executives as ...
Hacking and cyber-espionage groups around the world are attempting to exploit recently disclosed zero-day vulnerabilities in Microsoft Exchange Server, before the window of opportunity closes as ...
According to recent posts in the xda-developers forum, Amazon is confirmed to be rolling out a Fire OS 8.1.5.3 update for Fire TV devices for that patches the vulnerability. It’s likely that a patch ...
Researchers exploit a SQLite memory corruption issue outside of a browser. LAS VEGAS – Researchers at Check Point have identified a new class of vulnerabilities targeting SQLite, outside the context ...
Italian surveillance software maker Hacking Team recently claimed that it hasn’t lost any customers after the massive leak of its internal data two weeks ago. But it has lost at least one business ...
Yesterday, beginning at 18:24 UTC, someone or something exploited a security vulnerability on Wormhole, a tool that allows users to swap assets between Ethereum and a number of blockchains, resulting ...
Each year, the Zero Day Initiative hosts a "Pwn2Own" hacking contest where security researchers can earn money for finding serious vulnerabilities in major platforms like Windows and macOS. This 2021 ...
Crypto hack losses fell 37% in Q3 2025, with code exploit losses down 71%. Despite wallet breaches rising, industry efforts ...
Italian surveillance software maker Hacking Team recently claimed that it hasn’t lost any customers after the massive leak of its internal data two weeks ago. But it has lost at least one business ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results