Subscribe to Updates
Subscribe to our newsletter and be the first to access exclusive content and expert insights.
Browsing: Vulnerabilities
In recent years, leading commercial spyware vendors such as Intellexa and NSO Group have developed an array of powerful hacking tools that exploit rare and unpatched…
The Iranian government-backed hacker group known as APT 33 has been active for more than a decade, waging an aggressive espionage campaign against a range of…
Hundreds of millions of AMD chips have ‘sync close’ flaw, causing severe, virtually irreparable infection
In a background briefing to WIRED, AMD emphasized the difficulty of exploiting Sinkclose. To exploit the vulnerability, a hacker would need to already have access to…
Finally, HID stated that “to the best of its knowledge,” no encoder keys have been leaked or exposed, and “none of these issues have been exploited…
When a glitch in a software update from security firm CrowdStrike unintentionally caused digital chaos around the world last month, the first sign was Windows computers…
Researchers have long known that they can glean hidden information about the inner workings of a website by measuring the time it takes for various requests…
These platforms have taken design and marketing cues from legitimate information and e-commerce services. Many marketplaces and forums charge a subscription fee for access to the…