The tool the ransomware uses to get inside computers is called Eternal Blue, and it's more of an exploit than a tool. Leaked ...
A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I'm not explaining how this works.” ...
Google says hackers used AI to help build a zero-day exploit targeting 2FA, raising concerns about AI-assisted hacking.
The latest Microsoft Patch Tuesday rollout featured no zero-days. However, an angry hacker has just dropped two new 0-day ...
The Zero Day Initiative is offering a $1 million reward to security researchers who will demonstrate a zero-click WhatsApp exploit at its upcoming Pwn2Own Ireland 2025 hacking contest. The record ...
The attacker behind the Adshares bridge exploit has returned 256 ETH to the project's deployer address, covering about 86% of ...
Security researchers at Alphabet Inc.’s Google said they believe a cybercrime group used artificial intelligence to create a ...
Security researchers have uncovered a series of cyberattacks targeting Apple customers across the world. The tools used in these hacking campaigns have been dubbed Coruna and DarkSword, and they have ...
DeFi exploits keep piling up in 2026. Here’s what experts say is behind crypto’s security crisis—and how it can be fixed.
The Bitcoin DeFi project Echo fell victim to an exploit. The hacker minted 1k eBTC on Monad, and then collateralized 45 eBTC ...
An attacker has minted 1,000 eBTC on Echo Protocol's Monad bridge, then routed over $800,000 in stolen ETH through Tornado ...
On May 18, an attacker drained approximately $11.5 million from the Verus-Ethereum bridge using a forged Merkle proof. This ...