Exploitation of zero-days by commercial surveillance and spyware developers outpaced exploitation by nation-state actors last year, according to a report.
Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities actively exploited throughout 2025, almost half ...
Having some sort of antimalware protection is a must on Windows PCs, but if you're trying to pick between Bitdefender and McAfee, Consumer Reports may help.
Security researchers discover the 'Coruna' exploit kit running on malicious Chinese websites that were able to secretly hack ...
Google says 90 zero-day vulnerabilities were exploited in the wild in 2025, and an increasing percentage were aimed at enterprises.
NDTV Profit on MSN
Is Your iPhone At Risk? Cybercriminals Use 'Leaked US Govt Tools' To Target Older iPhones
These hacking tools originate from a leaked US government framework, according to iVerify, a fact checking tool designed by the United Nations Development Program.
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.
Israel, Iran, and the US are engaged in a rapidly escalating cyber conflict that targets each other’s governments, militaries ...
Journalist Peter Maseke Mwita has a keener interest than most in Friday's upcoming ruling on the constitutionality of Kenya's cybercrime law -- legislation that could see him jailed for up to 10 years ...
Google’s March 2026 Android update fixes 129 flaws, including a Qualcomm graphics zero day already used in limited attacks.
A scary email claims hackers stole your data and want Bitcoin. Here’s why it’s a scam, how it works and what to do right now.
Over 300,000 people installed fake AI Chrome extensions that secretly collected emails, passwords, and browsing activity.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results