Thousands of iPhones were compromised using the Coruna exploit kit, which chained 23 iOS vulnerabilities into advanced ...
The Coruna exploit kit has 23 exploits targeting iOS devices, previously used in Russian attacks and now in cybercrime ...
CISA has expanded the Known Exploited Vulnerabilities catalog with three bugs targeted by the nation-state-grade Coruna iOS ...
Follows suggestions iPhone-pwning toolset bears hallmarks of zero-days that targeted Russian diplomats Russian cybersecurity ...
A previously undocumented set of 23 iOS exploits named "Coruna" has been deployed by multiple threat actors in targeted ...
Bedrock said the root cause of the exploit has been “handled” and reassured users that all remaining assets were safe. Multi-asset liquid staking protocol Bedrock confirmed it fell victim to a ...
Snapchat, the temporary photo-sharing app that Reuters called one of 2013's "top smartphone apps," has been hacked, with 4.6 million usernames and associated phone numbers compiled into a database ...
Security researchers found a zero-click exploit in a new AI browser ...
Security analysts have uncovered a powerful suite of iPhone hacking tools that appear to have slipped from the control of a ...
A team of academic researchers has uncovered a new Android security exploit that raises a lot of questions about the platform’s permission system. The technique, named TapTrap, uses user interface ...
A deceptive proof-of-concept (PoC) exploit for CVE-2024-49113 (aka "LDAPNightmare") on GitHub infects users with infostealer malware that exfiltrates sensitive data to an external FTP server. The ...
Charlie Miller, principal security analyst at Independent Security Evaluators, used a security exploit in Safari 4 to hack into a MacBook in about 10 seconds Wednesday, winning the Pwn2own contest at ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results