Students attempting to access grades, study materials and quizzes were met instead with a message from a hacking group on ...
Google is offering a huge bug bounty for anyone who is capable of hacking the Titan M2 chip used in current Pixel phones. Over on its ‘Bug Hunters’ blog, Google lays out the details for finding ...
The ShinyHunters extortion gang has breached education technology giant Instructure again, this time exploiting another ...
A phishing campaign delivered through Google sponsored search results is targeting credentials for ManageWP, GoDaddy’s ...
Attackers could inject prompts into a GitHub issue and take over the AI agent designed to automatically triage the issue.
The data breach at education tech giant Instructure includes students' private data, according to a sample of the allegedly ...
Solana's Drift Protocol says most of the stolen funds linked to North Korean hackers remain traceable—and it has a plan to ...
Making headlines everywhere is the CopyFail Linux kernel vulnerability, which allows local privilege escalation (LPE) from any user to root privileges on most kernels and distributions. Local ...
“North Korean hacking groups accounted for 76% of all crypto hack losses in 2026 through April — not because North Korea ...
Days after the disclosure of a critical vulnerability in popular web hosting software cPanel and WHM, hackers keep targeting ...
Critical flaws affecting core components and extensions in PostgreSQL and MariaDB could allow remote code execution. The bugs ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results