Hyperbridge suffers a code exploit. The hacker tricked the protocol into minting one billion of Polkadot's DOT token. They ...
Plus: The FBI says a recent hack of its wiretap tools poses a national security risk, attackers stole Cisco source code as ...
A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I ...
A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government. Security researchers at ...
Security researchers have uncovered a series of cyberattacks targeting Apple customers across the world. The tools used in these hacking campaigns have been dubbed Coruna and DarkSword, and they have ...
Hackers claim to be selling internal Target source code after posting samples online. The data allegedly includes developer files and system tools of a US retailer. This raises concerns about ...
Claude Code 2.1.88 leak exposed 512,000 lines via npm error, fueling supply chain risks and typosquatting attacks.
Right now, across dark web forums, Telegram channels, and underground marketplaces, hackers are talking about artificial intelligence - but not in the way most people expect. They aren’t debating how ...
Drift Protocol's April 2026 exploit traces to a six-month DPRK-linked infiltration using fake identities, conferences, and ...
A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I ...