The Polish government accused a Russian government hacking group of hacking into energy facilities taking advantage of ...
The developer of the popular text editor Notepad++ said hackers associated with the Chinese government hijacked its software ...
ShinyHunters have breached Grubhub’s chat support system and are demanding a Bitcoin payment to prevent the data from being leaked, Bleeping Computer reports.
Unlike traditional attacks that rely on exploits, this succeeds through social engineering combined with abuse of Windows' own security architecture.
Ukraine's Computer Emergency Response Team (CERT) says that Russian hackers are exploiting CVE-2026-21509, a recently patched vulnerability in multiple versions of Microsoft Office.
Poland has said suspected Russian government hackers gained access to parts of the country’s energy infrastructure by ...
Threat actors are exploiting misconfigured web applications used for security training and internal penetration testing, such ...
A hacker has pulled off one of the most alarming AI-powered cyberattacks ever documented. According to Anthropic, the company behind Claude, a hacker used its artificial intelligence chatbot to ...
In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, ...
White hat hackers earned $1,047,000 for 76 unique vulnerabilities at the Pwn2Own Automotive 2026 hacking contest.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results