Hackers collect $439,250 after exploiting 29 zero-day vulnerabilities on the second day of Pwn2Own Automotive 2026.
The incident highlights growing supply-chain risks in crypto security as attackers shift from code exploits to abusing trusted software distribution channels.
A coordinated campaign has been observed targeting a recently disclosed critical-severity vulnerability that has been present ...
CERT-In warns millions of Chrome users to update immediately after a critical flaw exposes systems to remote cyberattacks.
It never stops. Attackers continue to exploit new vulnerabilities and tricks to hack accounts or infiltrate devices. To stay ...
Linux users face a new threat as cybercriminals exploit a critical vulnerability in Canonical’s Snap Store, hijacking trusted ...
There's a "relentless" campaign on the Ubuntu app store, experts have warned ...
CIQ builds secure, high-performance infrastructure for the AI era. As the founding support partner of Rocky Linux, CIQ ...
Hackers are on the hunt for open telnet ports in servers after discovering that a version of legacy client-server application ...
A team of researchers has revived Linux page cache attacks, demonstrating that they are not as impractical as previously ...
CISA has added to the KEV catalog two Linux vulnerabilities leading to privilege escalation and authentication bypass via ...
The 11-year-old vulnerability likely impacts many devices that are no longer supported — and presents easy exploit even for ...