Threat actors are weaponizing a zero-day vulnerability in Dell RecoverPoint for Virtual Machines in a cyberattack campaign ...
Artificial intelligence tools are helping hackers find and exploit vulnerable systems more quickly, and accelerate everything ...
Hackers accelerated the laundering of funds in the second half of 2025, using DeFi protocols and Web3 infrastructure to fragment and disguise their haul. Highly liquid protocols were attacked the most ...
The GMX exchange saw abnormal outflows of multiple assets, suggesting an ongoing exploit. The losses from the attack are around $42M based on the initial estimation. On-chain data showed suspicious ...
A private key compromise drained millions from IoTeX’s ioTube bridge, with analysts disputing total losses and warning recovery via THORChain may prove difficult.
Cheaters and hackers continue to run rampant in ARC Raiders, as some discover a huge new exploit that legitimate players say ...
Forbes contributors publish independent expert analyses and insights. Lars Daniel covers digital evidence and forensics in life and law. The Black Basta ransomware group has begun targeting internal ...
Critical security flaws targeting Windows and Office users allow hackers to take complete control of a victim's computer by clicking a malicious link or opening a file. Patch now.
Forbes contributors publish independent expert analyses and insights. Davey Winder is a veteran cybersecurity writer, hacker and analyst. Not all zero-day threat stories are worth getting unduly ...
Call of Duty owner Activision has been fairly open about its mitigation strategies to lessen the number of cheaters in the game using its Ricochet anti-cheat software, which a hacker reportedly says ...