According to X user Dark Web Informer, a cybercriminal known as Kamirmassabi recently posted an ad on an underground hacking forum, offering to sell a zero-day ...
While the ongoing war has brought attention to Iran’s cyber operations, threat intelligence indicates that China dominates ...
Google uncovered Coruna iOS exploit kit with 23 exploits across five chains targeting iPhones running iOS 13–17.2.1.
Enterprise software was a major focus of zero-day activity during 2025, with security and networking devices, like firewalls, ...
The zero-day that Google has included in the March Android security bulletin, and cybersecurity experts have warned could enable an attacker to bypass security controls and assume device control.
Attack surface exposure leaves services reachable as exploits appear within 24–48 hours after disclosure, increasing breach risk.
Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities actively exploited throughout 2025, almost half of them in enterprise software and appliances.
Exploitation of zero-days by commercial surveillance and spyware developers outpaced exploitation by nation-state actors last year, according to a report.
Beware the growing spyware wave. For the first time, commercial surveillance vendors last year topped Google's list of groups that exploited zero-day vulnerabilities in the wild, overtaking ...
Chinese state hackers and spyware vendors are fueling a rise in zero-day attacks, which increasingly target enterprise software and devices — security and networking products in particular.
Update Chromium-based browsers to the patched Chrome/Edge/Opera builds and relaunch them. A non-updated browser stays vulnerable. The fastest path to a “drain” is you signing bad approvals. Treat ...
The former head of Trenchant, a specialized U.S. defense contractor unit, was sentenced Tuesday to more than seven years in federal prison for stealing and selling zero-day exploits to a Russian ...