Thousands of iPhones were compromised using the Coruna exploit kit, which chained 23 iOS vulnerabilities into advanced attacks used for espionage and cybercrime.
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Exploit kits comprised of ...
The developers of the Neutrino exploit kit have added a new feature intended to thwart security researchers from studying their attacks. The feature was discovered after Trustwave’s SpiderLabs ...
The iPhone crypto exploit Coruna targets outdated iOS devices, stealing wallet seed phrases through compromised sites, ...
The Spelevo exploit kit has been spotted by security researchers while infecting victims with Maze Ransomware payloads via a new malicious campaign that exploits a Flash Player use after free ...
Security researchers have uncovered a hacking toolkit designed to compromise Apple iPhones and steal cryptocurrency wallet data. Threat analysts at Google say the exploit kit specifically targets ...
The RIG exploit kit is now infecting victim's computers with a new ransomware variant called Buran. This ransomware is a variant of the Vega ransomware that was previously being distributed through ...
The Cybersecurity and Infrastructure Security Agency has ordered federal agencies to patch three critical iOS vulnerabilities that were exploited over a 10-month span in hacking campaigns conducted by ...
Law enforcement actions and a relative dearth of zero-day bugs appear to have contributed to a sharp decline in exploit kit activity in recent months. It's too soon, however, to say whether the ...