Security researchers have discovered a vulnerability in Philips HDI 4000 Ultrasounds systems that can be exploited to prevent proper diagnosis, according to the HIPAA Journal. Hackers can gain access ...
A hacking campaign took just days to exploit a newly disclosed security vulnerability in Microsoft Windows version of WinRAR, ...
Claude Opus 4.6 linked to a $1.78M DeFi hack after cbETH mispricing. Auditor Pashov and SlowMist cite oracle formula vulnerability concerns.
Although they say it’s unlikely foreign groups could hack into U.S. voting machines, officials are alarmed that the Democratic Party email hack has exposed vulnerabilities in the electoral voting ...
Tech giant Microsoft on Tuesday said that three groups of China-based hackers were behind an ongoing cyberattack on its SharePoint file-sharing system. The Microsoft Security Response Center first ...
CISA warns that a fresh critical-severity SolarWinds vulnerability leading to unauthenticated RCE has been exploited in attacks.
Security researchers have hacked the Apple USB-C controller. Update, Jan. 14, 2025: This story, originally published Jan. 12, now includes further information regarding the impact of the Thomas Roth ...
In recent years, elite commercial spyware vendors like Intellexa and NSO Group have developed an array of powerful hacking tools that exploit rare and unpatched “zero-day” software vulnerabilities to ...
China’s Tianfu Cup hacking contest made its return in 2026, now overseen by the government and marked by limited transparency.
Microsoft on Tuesday said Chinese hacking groups were part of the recent attacks on its SharePoint collaboration software. As early as July 7, the Chinese nation-state actors it calls Linen Typhoon ...
Ethical hacking might sound like a contradiction in terms, but it’s actually an important tool when it comes to an organization's cyber security. An ethical hacker, also known as a white hat hacker, ...