On the second day of Pwn2Own Automotive 2026, security researchers collected $439,250 in cash awards after exploiting 29 unique zero-days. The Pwn2Own Automotive hacking contest focuses on automotive ...
Researchers from Google LLC and two cybersecurity companies have identified a set of zero-day exploits in iOS 18. Google’s GTIG threat intelligence team, Lookout Inc. and iVerify Inc. published their ...
$1 million WhatsApp hack at Pwn2Own Ireland confirmed. October 23 should stick in the memory of smartphone users for some time to come. This is the day that the Samsung Galaxy S25 was hacked, ...
2021: Exploiting a zero-day in SolarWinds Serv-U FTP software. 2023: Exploiting a zero-day in the GoAnywhere MFT platform, breaching over 100 companies. 2023: Exploiting a zero-day in MOVEit Transfer ...
Cybersecurity firm Kaspersky has detailed more of its findings on the distribution of malware through a zero-day exploit it uncovered in Google Chrome earlier this year. The exploit was executed ...
Fortinet deployed an emergency patch for yet another zero-day vulnerability that has been exploited in the wild. On Saturday, Fortinet disclosed CVE-2026-35616, which it described as an improper ...
The leak online of exploit code for an apparent Windows zero-day flaw dubbed "BlueHammer" could be the sign of a larger issue that security researchers face when collaborating with Microsoft on ...
Forbes contributors publish independent expert analyses and insights. Davey Winder is a veteran cybersecurity writer, hacker and analyst. This voice experience is generated by AI. Learn more. This ...
Suppliers of commercial spyware have edged ahead of nation-state threat actors when it comes to the exploitation of zero-day vulnerabilities at scale, according to data released by the Google Threat ...
Google Threat Intelligence Group warns enterprise systems increasingly targeted by zero-day exploits
A new report out today from Google LLC’s Threat Intelligence Group finds that zero-day vulnerability exploitation remained elevated in 2025 as attackers increasingly targeted enterprise infrastructure ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results