The tool the ransomware uses to get inside computers is called Eternal Blue, and it's more of an exploit than a tool. Leaked ...
An attacker drained $11.58 million from the Verus-Ethereum Bridge on May 18, 2026, and the stolen funds have not moved yet.
The Bitcoin-focused DeFi protocol suffered an attack whereby about 1,000 unauthorized eBTC $77 million were minted on the ...
DeFi exploits keep piling up in 2026. Here’s what experts say is behind crypto’s security crisis—and how it can be fixed.
The MAPO token collapsed this week after attackers exploited a vulnerability linked to the Butter Network cross-chain bridge.
Microsoft Exchange users are urged to mitigate a zero-day vulnerability that CISA has confirmed is under active exploitation.
A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I'm not explaining how this works.” ...
Google's GTIG identified the first zero-day exploit developed with AI and stopped a mass exploitation event. The report documents state actors using AI for vulnerability research and autonomous ...
MAP Protocol paused its bridge between MAPO ERC-20 and mainnet MAPO after a reported exploit on Butter Bridge V3.1. Here's ...
Browser exploits continue to haunt enterprise security. In May, Microsoft patched a browser vulnerability that could allow attackers to force Edge users into Internet Explorer compatibility mode, ...
Having another security threat emanating from Node.js’ Node Package Manager (NPM) feels like a weekly event at this point, but this newly discovered one is among the more refined. It exploits not only ...
The team behind the first public macOS kernel memory corruption exploit on M5 silicon has shared fresh details on how Mythos Preview helped bypass a five-year Apple security effort in five days.