Project Zero: Using large language models to catch vulnerabilities in real-world code security google Article 1866 words 7 votes
SS7: A mobile network operator protocol with scary vulnerabilities privacy security Video 31:55 29 votes
Maximum-severity Cisco vulnerability allows attackers to change admin passwords Article 516 words 26 votes
Cyber security: A pre-war reality check security.cyber microsoft amazon google Article 6976 words, published May 14 2024 34 votes
‘TunnelVision’ attack leaves nearly all VPNs vulnerable to spying security.cyber privacy Article 918 words, published May 6 2024 40 votes
The not-so-silent type. Vulnerabilities across keyboard apps reveal keystrokes to network eavesdroppers. security privacy Article 16 015 words 9 votes
Hackers can infect network-connected wrenches to install ransomware, researchers say security.cyber Article 493 words 28 votes
All cops are broadcasting. TETRA unlocked after decades in the shadows. security Article 340 words 26 votes
Incomplete disclosures by Apple and Google create “huge blindspot” for 0-day hunters apple google security Article 630 words 13 votes
WinRAR zero-day exploited since April to hack trading accounts security.cyber Article 622 words 31 votes
A data breach at Christie’s revealed exact GPS coordinates of collectors’ artworks Article 882 words, published Aug 21 2023 25 votes
Hackers exploited a zero-day flaw in Ivanti's software undetected for at least three months, US and Norwegian cybersecurity agencies warn security.cyber Article 456 words 14 votes
Apple fixes zero-days used to deploy Triangulation spyware via iMessage apple ios security.cyber Article 681 words 8 votes
SolarWinds: New findings from our investigation of SUNBURST security.cyber Article 1695 words 6 votes
Achilles: Over 400 vulnerabilities found in Qualcomm’s Snapdragon DSP chip, threatening the security of hundreds of millions of Android devices android security Article 1010 words, published Aug 6 2020 17 votes
Edison Mail vulnerability allowing unauthorized access to email accounts of other users ios security Article 695 words 4 votes
Analysis of Voatz mobile voting app by MIT researchers finds elementary security flaws security Article 1644 words 11 votes
Firefox zero-day was used in attack against Coinbase employees, not its users browsers security Article 494 words 11 votes
WhatsApp voice calls contained a buffer-overflow vulnerability that was used to install spyware [CVE-2019-3568] security ios android facebook Article 1008 words 11 votes
Chrome update on March 1 fixed a serious zero-day RCE vulnerability that was being actively exploited browsers security Article 453 words 10 votes
All Intel chips open to new Spoiler non-Spectre attack: Don't expect a quick fix security Article 1150 words 23 votes
How I abused 2FA to maintain persistence after a password change (Google, Microsoft, Instagram, Cloudflare, etc) security microsoft google facebook Article 958 words 16 votes
Facebook says new bug allowed apps access to private photos of up to 6.8m users privacy social media Link 33 votes