"The C2 hosts a web-based graphical user interface (GUI) titled 'NEXUS Listener' that can be used to view stolen information ...
Hackers have targeted TrueConf conference servers in attacks that exploit a zero-day vulnerability, allowing them to execute ...
Threat actors are exploiting the recent Claude Code source code leak by using fake GitHub repositories to deliver Vidar ...
The Uranium Finance indictment carries potential prison time of up to 30 years for fraud and money laundering counts.
March 2026 crypto hacks hit $52 million across 20 incidents, led by a $25 million Resolv Labs exploit and rising physical attacks.
A Google DeepMind paper maps six attack categories against autonomous AI agents—from invisible HTML commands to multi-agent ...
The exploit did not involve a bug in Drift's code. It used "durable nonces," a legitimate Solana transaction feature, to pre-sign administrative transfers weeks before executing them, bypassing the ...
An AI agent just autonomously exploited a FreeBSD kernel vulnerability in four hours, signaling a fundamental shift in the ...
Security teams are grappling with a major supply chain attack on Axios, a popular JavaScript library with over 100 million ...
Prosecutors say Jonathan Spalletta exploited smart contract bugs twice in April 2021, laundering funds through Tornado Cash ...
TA446 used leaked DarkSword on March 26 to target iOS devices, prompting Apple alerts and widening mobile espionage risks.
Isn’t there some claim events come in threes? After the extremely rare leak of the iOS Coruna exploit chain recently, now we have details from Google on a second significant exploit in the ...