Decentralized exchange Bunni fell victim to an exploit, losing about $2.4 million in stablecoins after attackers manipulated the platform’s liquidity calculations, according to onchain data by ...
ESET Research discovered a zero-day vulnerability in WinRAR being exploited in the wild in the guise of job application documents; the weaponized archives exploited a path traversal flaw to compromise ...
WhatsApp said on Friday that it fixed a security bug in its iOS and Mac apps that was being used to stealthily hack into the Apple devices of “specific targeted users.” The Meta-owned messaging app ...
A new report out today from Cloudflare Inc., marking the 11th anniversary of Project Galileo, reveals a sharp increase in cyberattacks targeting civil society organizations, with application-layer ...
A vulnerability allowing attackers to leak NTLM authentication hashes with minimal user interaction has been actively exploited just days after Microsoft released a patch. The flaw, tracked as ...
The number of vulnerabilities exploited by threat actors may be holding steady, but the types of targeted flaws and the speed with which attackers are weaponizing them should give enterprises concern.