Hackers accelerated the laundering of funds in the second half of 2025, using DeFi protocols and Web3 infrastructure to ...
Threat actors are weaponizing a zero-day vulnerability in Dell RecoverPoint for Virtual Machines in a cyberattack campaign ...
A hacking campaign took just days to exploit a newly disclosed security vulnerability in Microsoft Windows version of WinRAR, researchers at Check Point have said. The attackers leveraged ...
Critical security flaws targeting Windows and Office users allow hackers to take complete control of a victim's computer by clicking a malicious link or opening a file. Patch now.
Threat actors began targeting a recently patched BeyondTrust vulnerability shortly after a proof-of-concept (PoC) exploit was released.
Infini Hacker Returns After Exploit, Buys Ether Dip Worth $13M. A wallet tied to Infini's $50 million breach has re-emerged ...
Forbes contributors publish independent expert analyses and insights. Davey Winder is a veteran cybersecurity writer, hacker and analyst. Not all zero-day threat stories are worth getting unduly ...
Forbes contributors publish independent expert analyses and insights. Davey Winder is a veteran cybersecurity writer, hacker and analyst. Twice every year, some of the best hackers on the planet get ...
Lending protocols are some of the most active DeFi apps. Due to the heavy usage of smart contracts, they are also the most at ...
An exhaustive report from a Google security team says state-sponsored hackers from Russia, North Korea, China, and Iran are ...
Call of Duty owner Activision has been fairly open about its mitigation strategies to lessen the number of cheaters in the game using its Ricochet anti-cheat software, which a hacker reportedly says ...