Crypto hack losses fell 37% in Q3 2025, with code exploit losses down 71%. Despite wallet breaches rising, industry efforts ...
Hacking and cyber-espionage groups around the world are attempting to exploit recently disclosed zero-day vulnerabilities in Microsoft Exchange Server, before the window of opportunity closes as ...
Researchers exploit a SQLite memory corruption issue outside of a browser. LAS VEGAS – Researchers at Check Point have identified a new class of vulnerabilities targeting SQLite, outside the context ...
A security researcher claimed that zero-click WiFi exploit is one of the most notorious iPhone hacks right now. This iOS flaw, he said, enables cybercriminals to control and access nearby iPhones, ...
Cryptopolitan on MSN
20 major crypto exploits for $127M reported in September
Crypto exploits slowed down in September based on the total value of stolen funds, but showed more sophistication in exploiting smart contracts.
Each year, the Zero Day Initiative hosts a "Pwn2Own" hacking contest where security researchers can earn money for finding serious vulnerabilities in major platforms like Windows and macOS. This 2021 ...
The new Gmail exploit might endanger your sensitive information following a recently discovered flaw in the app's authentication code. Millions of users worldwide have been warned of this security ...
Over two months after Italian surveillance software maker Hacking Team had its internal data leaked by hackers, vendors are apparently still fixing zero-day exploits from the company’s arsenal. On ...
An American cybersecurity company was behind a 2016 iPhone hack sold to a group of mercenaries and used by the United Arab Emirates. When the United Arab Emirates paid over $1.3 million for a powerful ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results