AIs can create complex zero-day exploits. The consequence: The search for security vulnerabilities is successfully industrialized and scaled.
Check Point Research has identified a coordinated attack campaign targeting CVE-2025-37164, a critical vulnerability in HPE ...
Pwn2Own Automotive 2026 has uncovered 76 zero-day vulnerabilities in Tesla systems, EV chargers, and vehicle platforms, with researchers earning $1,047,000.
This week’s recap unpacks how evolving exploits, malware frameworks, and cloud missteps are reshaping modern cyber defense ...
Verizon Business released its 2025 Data Breach Investigations Report (DBIR), which reveals a significant increase in cyberattacks. The report found that third-party involvement in breaches has doubled ...
Both platforms serve as backbone infrastructure for remote work and software development, making these flaws particularly dangerous for business continuity.
Microsoft today issued patches to plug at least 113 security holes in its various Windows operating systems and supported ...
Microsoft has patched 112 vulnerabilities in January 2026, including CVE-2026-20805, a Desktop Window Manager zero-day that ...
Stealthy Apache Tomcat Critical Exploit Bypasses Security Filters: Are You at Risk? Your email has been sent Apache Tomcat is under attack as cybercriminals actively exploit a recently disclosed ...
The numbers tell a stark story: $1.42 billion lost across 149 documented incidents in 2024 due to smart contract vulnerabilities, with access control ...
Forbes contributors publish independent expert analyses and insights. Davey Winder is a veteran cybersecurity writer, hacker and analyst. Update, May 15, 2025: This story, originally published May 14, ...
TL;DR: Security researchers identified a critical vulnerability (CVE-2025-6218) in older WinRAR versions that allows hackers to bypass security features and execute malicious files from extracted ...