8:00 AM PDT · May 1, 2026 Hacktivists have claimed responsibility for taking down the public-facing infrastructure of popular Linux operating system distribution Ubuntu, as…
Author: Lorenzo Franceschi-Bicchierai
Man who hacked US Supreme Court filing system sentenced to probation |
Nicholas Moore, who pleaded guilty to hacking the U.S. Supreme Court’s electronic document filing system dozens of times over several months, was sentenced on Friday…
Hackers are abusing unpatched Windows security flaws to hack into organizations |
Hackers have broken into at least one organization using Windows vulnerabilities published online by a disgruntled security researcher over the last two weeks, according to…
Hackers steal and leak sensitive LAPD police documents |
Cybercriminals have allegedly stolen a large amount of sensitive internal documents from the Los Angeles Police Department and leaked the data online. The stolen data…
Hack-for-hire group caught targeting Android devices and iCloud backups |
Security researchers say they have identified a hack-for-hire group targeting journalists, activists, and government officials across the Middle East and North Africa. The hackers used…
After fighting malware for decades, this cybersecurity veteran is now hacking drones |
Mikko Hyppönen is pacing back and forth on the stage, with his trademark dark blond ponytail resting on an impeccable teal suit. A seasoned speaker,…
WhatsApp notifies hundreds of users who installed a fake app made by government spyware maker |
9:34 AM PDT · April 1, 2026 WhatsApp says it has notified around 200 users who were tricked into installing a malicious fake version of…
A major hacking tool has leaked online, putting millions of iPhones at risk. Here’s what you need to know. |
Security researchers have uncovered a series of cyberattacks targeting Apple customers across the world. The tools used in these hacking campaigns have been dubbed Coruna…
Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks |
The common assumption among iPhone security experts has been that finding vulnerabilities and developing exploits for iOS was difficult, requiring a lot of time, resources,…