Authorities say LeakBase was "one of the world’s largest online forums for cybercriminals," and maintained an archive of ...
Security researchers discover the 'Coruna' exploit kit running over malicious Chinese websites that were able to secretly hack vulnerable iPhones running iOS 13 to 17.2.1.
A compromised Chrome extension with 7,000 users was updated to deploy malware, strip security headers, and steal cryptocurrency wallet seed phrases.
Security researchers say exploits used by governments to hack into iPhones have been found to be used by cybercriminals. They warned of an emerging market for "secondhand" exploits.
A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government.
An OpenClaw vulnerability allowed malicious websites to take over AI agents, exposing sensitive information and enabling data theft.
McDonald's McNugget Caviar website crashed on Tuesday morning as people tried to get the free kit that came with a tin of caviar and a $25 McDonald's gift card to purchase McNuggets ahead of Valentine ...
It’s no secret that Pokémon games tend to follow the same trends, mimicking each other and retreading a lot of the same ground. This is what inspires so many ROM hacks, or fan-projects that try to ...
A ransomware attack on New Zealand’s “ManageMyHealth” (MMH) medical portal, disclosed on New Year’s Day, has exposed sensitive medical records of some 127,000 patients nationwide. The cybercriminal ...
Prominent crime forum BreachForums has suffered a new and possibly fatal blow to its reputation after the revelation that a database of thousands of criminals using it was stolen months ago. News of ...
The malicious Trust Wallet extension has also been exporting users’ personal information, pointing to potential insider activity, according to cybersecurity company SlowMist. Trust Wallet users lost ...
It’s hard to imagine a more nightmarish scenario. You’re warned your email account has been hacked. The attacker has used this to gain access to your phone or computer’s camera and microphone. “I ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results