It looks like a cute little dolphin-themed toy, but the Flipper Zero is a surprisingly powerful learning tool for hacking. Here's how I mastered mine—and how you can, too.
A fake Go module posing as golang.org/x/crypto captures terminal passwords, installs SSH persistence, and delivers the ...
AI-powered hacker exploited Anthropic's Claude to steal 150GB of Mexican government data, exposing 195 million taxpayer ...
Vulnerabilities in Anthropic’s Claude Code tool could have allowed attackers to silently gain control of a developer’s computer.
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.
The former boss of a U.S. hacking tools maker was jailed for selling highly sensitive software exploits to a Russian broker.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released new details about RESURGE, a malicious implant used in zero-day attacks exploiting CVE-2025-0282 to breach Ivanti Connect ...
The security researchers from Zscaler ThreatLabz have also discovered five new tools deployed by the North Korean hacking ...
Artificial intelligence is revolutionizing the technology industry and this is equally true for the cybercrime ecosystem, as cybercriminals are increasingly leveraging generative AI to improve their ...
The Chinese spying group, dubbed UNC2814, is quite prolific and has been targeting telecom firms, though it's separate from China's notorious Salt Typhoon.