Thousands of iPhones were compromised using the Coruna exploit kit, which chained 23 iOS vulnerabilities into advanced attacks used for espionage and cybercrime.
The Wikimedia Foundation suffered a security incident today after a self-propagating JavaScript worm began vandalizing pages ...
Google and iVerify researchers say the case points to a thriving secondary market for high-end zero-day exploits.
The zero-day that Google has included in the March Android security bulletin, and cybersecurity experts have warned could enable an attacker to bypass security controls and assume device control.
Google has released its Android Security Bulletin for March with patches for 129 vulnerabilities, one of which is a zero-day flaw that may be under targeted, limited exploitation.
The exploitation of CVE-2026-21385, a high-severity memory corruption flaw, could be tied to commercial spyware or nation-state threat groups.
Abstract: The low-altitude economy (LAE) is emerging as a critical enabler for next-generation (6G) networks. In this correspondence, we propose a secure and energy-efficient simultaneous wireless ...