Microsoft now says suspected Russian hackers behind a massive campaign that impacted government agencies, local municipalities and companies were also able to view some of the company’s source code.
Hackers are utilizing the WordPress mu-plugins ("Must-Use Plugins") directory to stealthily run malicious code on every page while evading detection. The technique was first observed by security ...
Hackers behind the $100 million Nobitex exploit have released the exchange’s full source code, escalating tensions amid the Israel-Iran conflict. Hackers behind a $100 million exploit of Iranian ...
Microsoft 365 is under attack, China and Russia afflited hackers suspected. Updated December 23 with advice from a mobile security solutions expert regarding the Russian device code attacks targeting ...
Cybersecurity firm F5 Networks says government-backed hackers had “long-term, persistent access” to its network, which allowed them to steal the company’s source code and customer information. In a ...
For the first time in history, cyber malicious actors have used Anthropic’s Claude Code, a generative AI coding assistant, to conduct cyber-attacks. The attackers are likely Chinese state-sponsored ...
Hackers are moving from smart contract vulnerabilities to exploiting human behavioural weaknesses, according to the co-founder of Web3 cybersecurity firm CertiK. Cryptocurrency hackers are moving away ...
Update, Jan 13th, 2026: Multiple Target employees have now confirmed in our follow-up report the authenticity of leaked source code sample set and shared internal announcements regarding an access ...
Qiang Tang receives funding from Google via Digital Future Initiative to support the research on this project. Moti Yung works for Google as a distinguished research scientist. Yanan Li is supported ...
When quantum computers become commonplace, current cryptographic systems will become obsolete. Scientists are racing to get ahead of the problem and keep our data secure. When you purchase through ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results