News

Hackers are increasingly using a new AI-powered offensive security framework called HexStrike-AI in real attacks to exploit ...
Researchers exploit a SQLite memory corruption issue outside of a browser. LAS VEGAS – Researchers at Check Point have identified a new class of vulnerabilities targeting SQLite, outside the ...
More importantly, some security researchers claim to have found exploits for previously unknown and unpatched vulnerabilities — these are known as zero-day exploits.
A security expert has warned millions of users about the new Google Gmail vulnerability that could hijack their saved credentials on the websites.
U.S.-based Netragard has terminated its zero-day exploit selling program in response to revelations about Hacking Team's customers ...
An American cybersecurity company was behind a 2016 iPhone hack sold to a group of mercenaries and used by the United Arab Emirates.
Pwn2Own contest will pay $900,000 for hacks that exploit this Tesla For the first time, foremost hacking competition adds cars to its lineup.