An ethical hacker has earned a record $10 million bug bounty reward after discovering a critical security vulnerability in the Wormhole core bridge contract on Ethereum. Wormhole is...
Cryptocurrency scammers are using deep fake videos of Elon Musk and other prominent cryptocurrency advocates to promote a BitVex trading platform scam that steals deposited currency....
Threat analysts have discovered a recent malware distribution campaign using PDF attachments to smuggle malicious Word documents that infect users with malware. The choice of PDFs...
Google’s Threat Analysis Group (TAG) says that state-backed threat actors used five zero-day vulnerabilities to install Predator spyware developed by commercial surveillance developer Cytrox. In these...
On the third and last day of the 2022 Pwn2Own Vancouver hacking contest, security researchers successfully hacked Microsoft’s Windows 11 operating system three more times using...
A critical vulnerability present among 90,000-plus active installations of the Jupiter WordPress theme allows for the takeover of target websites. Although attackers must be authenticated to exploit the...
The office of the national cyber director is tasked by Congress to weigh in on agencies’ cybersecurity budgets. National Cyber Director Chris Inglis drew attention on...
During the second day of the Pwn2Own Vancouver 2022 hacking competition, contestants hacked Microsoft’s Windows 11 OS again and demoed zero-days in Tesla Model 3’s infotainment...
Russia’s banking and financial services company Sberbank is being targeted in a wave of unprecedented hacker attacks. Earlier this month, the bank fought off the largest...
The Government of Canada announced its intention to ban the use of Huawei and ZTE telecommunications equipment and services across the country’s 5G and 4G networks. The statement...