Critics of spyware and exploit sellers have long warned that the advanced hacking sold by commercial surveillance vendors (CSVs) represents a worldwide danger because they inevitably find their way ...
Google says it has evidence that Russian government hackers are using exploits that are “identical or strikingly similar” to those previously made by spyware makers Intellexa and NSO Group. In a blog ...
As exploitation activity against CVE-2025-55182, researchers are finding some exploits contain bypasses for Web application firewall (WAF) rules.
Update: This post was revised throughout to reflect changes F-Secure made to Thursday’s blog post. The company now says that the NotPetya component was probably completed in February, and assuming ...
A Zero Day is both an unpatched software hole previously unknown to the software vendor and the code attackers use to take advantage of said hole. Zero day actually refers to two things---a zero-day ...
But the reasons why are complicated—and not all bad news. A zero-day exploit—a way to launch a cyberattack via a previously unknown vulnerability—is just about the most valuable thing a hacker can ...
Peter Williams, the former general manager of Trenchant, a division of defense contractor L3Harris that develops surveillance and hacking tools for Western governments, pleaded guilty last week to ...
This story accompanies a profile of the French exploit-selling firm Vupen in the April 9th issue of Forbes magazine. A clever hacker today has to make tough choices. Find a previously unknown method ...