Microsoft released patches for CVE-2026-21509, a new Office zero-day vulnerability that can be exploited to bypass security ...
Microsoft has released emergency security updates to patch a high-severity Office zero-day vulnerability exploited in attacks ...
AIs can create complex zero-day exploits. The consequence: The search for security vulnerabilities is successfully industrialized and scaled.
Microsoft releases an urgent out-of-band update for a critical Office zero-day flaw already exploited in real-world attacks.
To exploit the vulnerability, an attacker would need either system access or be able to convince a user to open a malicious ...
Hackers collect $439,250 after exploiting 29 zero-day vulnerabilities on the second day of Pwn2Own Automotive 2026.
VulnCheck analysts found that vulnerabilities exploited before being publicly disclosed rose from 23.6% in 2024 to 28.96% in 2025 ...
As the three-day hacking frenzy that is Pwn2Own Berlin comes to an end, the staggering extent of the skill displayed by the hackers taking part has been confirmed. With a total of no less than 28 ...
CrushFTP, a service that provides users with secure file server software, has recently been targeted by hackers. Unfortunately, it seems as if some customers have been compromised, with thousands of ...
Google’s Threat Analysis Group (TAG) and Mandiant teams observed 97 zero-day vulnerabilities exploited in the wild last year, a staggering 56% increase over 2022's 62 zero-day exploits, but shy of ...
Vulnerabilities in enterprise network and security appliances accounted for nearly half of the zero-day flaws exploited by attackers last year, according to Google’s Threat Intelligence Group.
Unknown flaws in software can be exploited by hackers, leading to irreversible losses in crypto due to the decentralized nature of blockchain. Without a central authority to reverse transactions, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results