Critical security flaws targeting Windows and Office users allow hackers to take complete control of a victim's computer by clicking a malicious link or opening a file. Patch now.
Interview with Douglas Day, member of the Hacker Advisory Board at HackerOne and a full-time professional hacker.
The Polish government accused a Russian government hacking group of hacking into energy facilities taking advantage of default usernames and passwords.
Texas sued networking giant TP-Link Systems, accusing the company of deceptively marketing its routers as secure while allowing Chinese state-backed hackers to exploit firmware vulnerabilities and ...
Security researchers collected $267,500 in cash after exploiting 22 unique zero-day vulnerabilities during the second day of the Pwn2Own Ireland 2025 hacking competition. Today's highlight was Ken ...
The hacker claims to have stolen nearly 700,000 Substack user records, including email addresses and phone numbers.
Allison Nixon had helped arrest dozens of members of The Com — a loose affiliation of online groups responsible for violence and hacking campaigns. Then she became a target.
Flaws in how 17 models of headphones and speakers use Google’s one-tap Fast Pair Bluetooth protocol have left devices open to eavesdroppers and stalkers. Today, security researchers at Belgium’s KU ...
Time itself comes under attack as a state-backed hacking gang spends two years tunnelling toward a nation’s master clock — with chaos potentially only a tick away. Plus when ransomware negotiators ...
Cyber security is about protecting our digital world from bad actors. Threats come in many forms, from sneaky malware to outright attacks. People try to steal or damage things online for money, ...