DeFi exploits keep piling up in 2026. Here’s what experts say is behind crypto’s security crisis—and how it can be fixed.
Microsoft Exchange has now joined Windows 11 as Pwn2Own zero-day hackers continue to successfully attack the tech giant’s ...
The latest Microsoft Patch Tuesday rollout featured no zero-days. However, an angry hacker has just dropped two new 0-day ...
Cryptopolitan on MSN
Adshares hacker returns 86% of $628K loot as analysts expose post-hack vulnerabilities
The attacker behind the Adshares bridge exploit has returned 256 ETH to the project's deployer address, covering about 86% of ...
The tool the ransomware uses to get inside computers is called Eternal Blue, and it's more of an exploit than a tool. Leaked ...
Critics of spyware and exploit sellers have long warned that the advanced hacking sold by commercial surveillance vendors (CSVs) represents a worldwide danger because they inevitably find their way ...
Institutions exploring DeFi are growing wary of bridge exploits, opaque risk exposure and yields that no longer justify the ...
An attacker has minted 1,000 eBTC on Echo Protocol's Monad bridge, then routed over $800,000 in stolen ETH through Tornado ...
Google says hackers used AI to help build a zero-day exploit targeting 2FA, raising concerns about AI-assisted hacking.
The Zeroday Cloud hacking competition in London has awarded researchers $320,000 for demonstrating critical remote code execution vulnerabilities in components used in cloud infrastructure. The first ...
Security researchers have uncovered a series of cyberattacks targeting Apple customers across the world. The tools used in these hacking campaigns have been dubbed Coruna and DarkSword, and they have ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results