The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and ...
Thousands of iPhones were compromised using the Coruna exploit kit, which chained 23 iOS vulnerabilities into advanced ...
The GlassWorm supply-chain campaign has returned with a new, coordinated attack that targeted hundreds of packages, ...
A previously undocumented set of 23 iOS exploits named "Coruna" has been deployed by multiple threat actors in targeted ...
A ModelScope MS-Agent vulnerability allows attackers to feed malicious commands to AI agents and modify system files or steal data.
Despite what the internet’s many misleading headlines may lead you to believe, Android security (gasp!) isn’t actually all ...
IoTeX, a blockchain project focused on Internet-of-Things devices, offered a 10% white-hat bounty to the hacker or hackers who exploited a private key on its cross-chain bridge ioTube, siphoning ...
As security risks intensify, districts can take these steps to secure networks, devices and data without overextending ...
The Queen Zone on MSN
What parental control apps miss that predators exploit
Parental control apps are marketed as essential shields against online dangers, but a growing body of research, litigation, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results