A previously undocumented set of 23 iOS exploits named "Coruna" has been deployed by multiple threat actors in targeted ...
Google and iVerify have shared details about Coruna, an exploit kit that chains multiple vulnerabilities to target iPhones ...
Hackers are exploiting a critical vulnerability in the User Registration & Membership plugin, which is installed on more than ...
A security advisory was issued for two vulnerabilities affecting the Seraphinite Accelerator WordPress plugin.
In the coming weeks, Google will officially debut Android developer verification, which will require app makers outside the ...
The exposed fields reportedly included full names, dates of birth, physical addresses, phone numbers, email addresses and ...
The exposed fields reportedly included full names, dates of birth, physical addresses, phone numbers, email addresses and national identification numbers.
It can be overwhelming to think about all the ways bad actors are trying to exploit your digital privacy. Boston 25 consumer advisor Clark Howard says, “Don’t give up hope.” ...
This week, Cisco patches and hacks. Trojanized app targeted Israelis. Bye-bye, Tycoon 2FA. Also bye-bye LeakBase. A ...
A PlayStation 5 exploit has let gamers add Grand Theft Auto 6—out in November—to their "recently played" list on their ...
Data breach extortion group ShinyHunters used social engineering to steal customer names, addresses and phone numbers from the blockchain lender.
A compromised Chrome extension with 7,000 users was updated to deploy malware, strip security headers, and steal cryptocurrency wallet seed phrases.