Apple patches older iPhones and iPads against Coruna exploits
(bleepingcomputer.com)
31.
32.
Apple releases iOS 15.8.7 to fix Coruna exploit for iPhone 6S from 2015
(news.ycombinator.com)
33.
34.
Hacker broke into FBI and compromised Epstein files, report says
(techcrunch.com)
35.
36.
Flaw in Grandstream VoIP phones allows stealthy eavesdropping
(bleepingcomputer.com)
37.
CISA orders feds to patch actively exploited Dell flaw within 3 days
(bleepingcomputer.com)
38.
Google patches first Chrome zero-day exploited in attacks this year
(bleepingcomputer.com)
39.
Microsoft Under Pressure to Bolster Defenses for BYOVD Attacks
(darkreading.com)
40.
Apple patches decade-old iOS zero-day, possibly exploited by commercial spyware
(news.ycombinator.com)
41.
Apple fixes zero-day flaw used in 'extremely sophisticated' attacks
(bleepingcomputer.com)
42.
iOS 26.3 and macOS 26.3 Fix Dozens of Vulnerabilities, Including Zero-Day
(news.ycombinator.com)
43.
44.
Sleeper Shells: Attackers Are Planting Dormant Backdoors in Ivanti EPMM
(news.ycombinator.com)
45.
CISA: VMware ESXi flaw now exploited in ransomware attacks
(bleepingcomputer.com)
46.
Ivanti warns of two EPMM flaws exploited in zero-day attacks
(bleepingcomputer.com)
47.
48.
Months After Patch, WinRAR Bug Poised to Hit SMBs Hardest
(darkreading.com)
49.
Microsoft Rushes Emergency Patch for Office Zero-Day
(darkreading.com)
50.
WinRAR path traversal flaw still exploited by numerous hackers
(bleepingcomputer.com)
51.
Critical sandbox escape flaw found in popular vm2 NodeJS library
(bleepingcomputer.com)
52.
Critical sandbox escape flaw discovered in popular vm2 NodeJS library
(bleepingcomputer.com)
53.
CISA confirms active exploitation of four enterprise software bugs
(bleepingcomputer.com)
54.
The coming industrialisation of exploit generation with LLMs
(news.ycombinator.com)
55.
VMware ESXi zero-days likely exploited a year before disclosure
(bleepingcomputer.com)
56.
Cisco warns of Identity Service Engine flaw with exploit code
(bleepingcomputer.com)
57.
CISA tags max severity HPE OneView flaw as actively exploited
(bleepingcomputer.com)
58.
New D-Link flaw in legacy DSL routers actively exploited in attacks
(bleepingcomputer.com)
59.
Over 10K Fortinet firewalls exposed to actively exploited 2FA bypass
(bleepingcomputer.com)
60.
L1TF Reloaded
(news.ycombinator.com)