With new systems from companies like Anthropic and OpenAI, hackers can attack with greater speed. The defense is more A.I.
Qualcomm confirmed that fixes for the GBL exploit were provided to Android device makers earlier this month. The exploit, discovered by Xiaomi ShadowBlade Security Lab, was a key component in ...
A vulnerability in Qualcomm’s Android Bootloader implementation allows unsigned code to run via the “efisp” partition on Android 16 devices. This is paired with a “fastboot” command oversight to ...
A new Qualcomm GBL exploit is reportedly affecting Qualcomm SoCs, mainly the latest Snapdragon 8 Elite Gen 5. This enables bootloader unlocking on flagship phones that were previously difficult to ...
The big picture: A cybercriminal is reportedly selling a Windows zero-day exploit on the dark web for $220,000. The vulnerability, which targets Windows Remote Desktop Services, could allow an ...
An iOS warning has been issued by researchers after they discovered “a new and powerful” exploit kit targeting Apple iPhone models running iOS version 13 to 17.2.1. An iOS warning has been issued by ...
Google Threat Intelligence Group warns enterprise systems increasingly targeted by zero-day exploits
A new report out today from Google LLC’s Threat Intelligence Group finds that zero-day vulnerability exploitation remained elevated in 2025 as attackers increasingly targeted enterprise infrastructure ...
Google's Threat Intelligence Group (GTIG) has a new report out about a powerful iOS exploit kit called "Coruna," which traveled from a surveillance vendor's customer to a Russian espionage group to ...
A previously undocumented set of 23 iOS exploits named “Coruna” has been deployed by multiple threat actors in targeted espionage campaigns and financially motivated attacks. The Coruna kit contains ...
Security researchers have identified a suite of powerful hacking tools capable of compromising iPhones running older software that they say has passed from a government customer into the hands of ...
A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government. Security researchers at ...
Google’s Threat Intelligence Group and security company iVerify have shared details about Coruna, an exploit kit that chains multiple vulnerabilities to target iPhones running older iOS versions. Here ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results