Cybersecurity researchers have found out the known Android malware, NGate, is now abusing a legitimate payment app via NFC.
From the FBI breach to the DarkSword iPhone exploit, these are the biggest cyber attacks and security failures that have ...
Adobe patches a critical PDF flaw exploited for months, allowing attackers to bypass sandbox protections and deliver malware.
Stay ahead of the logs with our Monday Recap. We break down active Adobe 0-days, North Korean crypto stings, and critical CVEs you need to patch today ...
Adobe Acrobat and Reader users are under attack from hackers using a zero-day vulnerability. Update within 72 hours, Adobe ...
Hackers have been exploiting an Adobe Reader zero-day vulnerability since December 2025; PDF users are warned.
Now a security researcher says a Reader hole has been quietly exploited by malware for as long as four months, fingerprinting ...
Some of the most popular apps you have likely downloaded on your iPhone or Android smartphone are dangerous. And now the FBI is warning U.S. citizens to stop all such installs. The bureau’s new Public ...
Factory Reset Protection (FRP) is a vital anti-theft measure, yet it regularly irritates genuine buyers of used phones and repair shops. The main problem lies in a “cat-and-mouse game”: smartphone ...
A new Android attack technique that manipulates the runtime environment instead of modifying applications has been identified. The method, discovered by CloudSEK researchers, uses the LSPosed ...
Researchers have released a three-vulnerability exploit chain targeting Qualcomm's GBL on Android 16, enabling bootloader unlocking on Xiaomi 17 flagships. Researchers released a three-vulnerability ...
Qualcomm confirmed that fixes for the GBL exploit were provided to Android device makers earlier this month. The exploit, discovered by Xiaomi ShadowBlade Security Lab, was a key component in ...