An attacker drained $11.58 million from the Verus-Ethereum Bridge on May 18, 2026, and the stolen funds have not moved yet.
The Bitcoin-focused DeFi protocol suffered an attack whereby about 1,000 unauthorized eBTC $77 million were minted on the ...
The tool the ransomware uses to get inside computers is called Eternal Blue, and it's more of an exploit than a tool. Leaked ...
Microsoft Exchange users are urged to mitigate a zero-day vulnerability that CISA has confirmed is under active exploitation.
Verus Protocol’s Ethereum bridge was reportedly exploited on Monday through a fake cross-chain transfer message that allowed ...
Browser exploits continue to haunt enterprise security. In May, Microsoft patched a browser vulnerability that could allow attackers to force Edge users into Internet Explorer compatibility mode, ...
The team behind the first public macOS kernel memory corruption exploit on M5 silicon has shared fresh details on how Mythos Preview helped bypass a five-year Apple security effort in five days.
Echo Protocol said that a compromised admin key had enabled unauthorized eBTC minting on its Monad deployment.
With the popularity of the Netflix series Zero Day among cybersecurity experts and others, the show has evolved into an interesting reference for comprehending the far-reaching effects of zero-day ...
Having another security threat emanating from Node.js’ Node Package Manager (NPM) feels like a weekly event at this point, but this newly discovered one is among the more refined. It exploits not only ...
Decentralized lending platform Abracadabra.Finance suffered an attack that drained $13 million worth of cryptocurrency from pools tied to GMX liquidity tokens. Blockchain security firm PeckShield ...
A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I'm not explaining how this works.” ...