Security researchers say exploits used by governments to hack into Apple iPhones have been found used by cybercriminals. They ...
Google and iVerify have shared details about Coruna, an exploit kit that chains multiple vulnerabilities to target iPhones ...
A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government.
According to new technical analyses from Google and mobile security firm iVerify, Coruna's technical core comprises five complete exploit chains and 23 distinct iOS vulnerabilities that ...
A hacking campaign took just days to exploit a newly disclosed security vulnerability in Microsoft Windows version of WinRAR, researchers at Check Point have said. The attackers leveraged ...
Researchers uncover wormable XMRig campaign using BYOVD exploit and LLM-built React2Shell attacks hitting 90+ hosts.
New York Magazine on MSN

The AI-Powered Hacking Spree Is Here

It turns out AI-coding tools are useful to criminals, too.
The former boss of a U.S. maker of hacking and surveillance tools stole and sold technology that can hack millions of computers and people worldwide, U.S. prosecutors have confirmed for the first time ...
Security researchers discover the 'Coruna' exploit kit running over malicious Chinese websites that were able to secretly hack vulnerable iPhones running iOS 13 to 17.2.1.
Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious payloads for Windows and Linux. On Windows, an ...
Hemi confirms the Ploutos Money exploit on Feb 26, 2026, draining $388K across Hemi, Ethereum, Arbitrum, Hyperliquid, and ...