Hackers exploited a cross-chain bridge on Saturday, draining nearly $300 million from a key piece of decentralized finance ...
How Nations Hack, Spy, and Shape the Digital Battlefield, Allie Mellen provides true stories of the current cyber war and, ...
A critical Nginx UI vulnerability that allows attackers to take full control of servers has been exploited in the wild.
A security researcher published details of three security vulnerabilities in Windows Defender, and the code used to exploit ...
Amit Forlit is accused of running a hacking operation that aimed to thwart climate litigation at the behest of a lobbying ...
In Telegram groups, men are sharing thousands of nonconsensual images of women and girls, buying spyware, and engaging in ...
Prosecutors say Amit Forlit ran a global hacking operation on behalf of a Washington lobbying group that aimed to thwart ...
A hacker has allegedly stolen a massive trove of sensitive data – including highly classified defense documents and missile ...
WASHINGTON—Iran pulled off likely the most significant wartime cyberattack against the U.S. in history, leveraging its hacking powers to cause major disruptions at a global medical-equipment firm that ...
Google and cybersecurity companies Lookout and iVerify have detailed a new hacking technique that potentially puts a significant portion of iPhone users in danger, just by visiting the wrong web page.
"You realize you're good at this thing that can make you money in a bad way. It's easy money even though it's dirty," said ...
A hot potato: For more than a decade, the Xbox One stood as a remarkable exception in console security – a machine long considered impervious to hacking attempts. That reputation is now over. At the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results