DJI will pay Azdoufal $30,000 for one single discovery, according to an email he shared with The Verge, without specifying ...
Millions installed 'productivity' Chrome extensions that became malware after acquisition. Here's how browser extensions became enterprise security's weakest link.
The nonprofit that oversees Wikipedia briefly enforced a 'read-only' mode on Thursday morning as users spotted code designed to delete articles and place Russian text in the edit summary.
Dubbed InstallFix by Push Security, the scheme inserts instructions to download malware during the Claude Code install process on cloned websites.
Thousands of iPhones were compromised using the Coruna exploit kit, which chained 23 iOS vulnerabilities into advanced attacks used for espionage and cybercrime.
The Wikimedia Foundation suffered a security incident today after a self-propagating JavaScript worm began vandalizing pages and modifying user scripts across multiple wikis.
The iPhone crypto exploit Coruna targets outdated iOS devices, stealing wallet seed phrases through compromised sites, enabling crypto theft.
Instances of generative AI-assisted hacking are on the rise, and the threat of cyberattacks from bots acting on their own is no longer science fiction. With AI doing their bidding, novices can cause ...
Security researchers at Google have exposed a powerful set of vulnerabilities for iOS called Coruna, which has hacked thousands of iPhone devices.A report from the Google Threat Intelligence Group ...
According to new technical analyses from Google and mobile security firm iVerify, Coruna's technical core comprises five complete exploit chains and 23 distinct iOS vulnerabilities that ...
OpenClaw patches ClawJacked flaw, log poisoning bug, and multiple CVEs as 71 malicious ClawHub skills spread malware and ...
What makes this campaign so striking is not just the malware, but where it is being stored. By shifting malicious code into ...