Some think it's a cheat, others think it's an exploit. But we found a more likely explanation.
People who trade in zero-day exploits say there are two Zoom zero-days, one for Windows and one for MacOS, on the market.
Hackers are turning their attention to Zoom in hopes of selling bugs for thousands of dollars to government agents or other customers.
For five years, Google has funded Project Zero, a team of hackers with the sole mission of finding bugs in whatever software they wanted to research, be it Google’s or somebody else’s. Are they making the internet safer?
Emails between the DEA and NSO obtained by Motherboard explain why the DEA didn't purchase the company's malware in 2014.
Apple says that Google oversold the nature of the hack and that it quickly fixed the vulnerability.
There are caveats and the sellers are only a slice of the exploit market, but two exploit brokers say they’re seeing more iOS attacks now.
Apple accidentally unpatched a vulnerability it had already fixed, making current versions of iOS vulnerable to hackers.
Researchers from U.S. government contractor Immunity have developed a working exploit for the feared Windows bug known as BlueKeep.
Obtaining vulnerabilities for fully up-to-date mobile phones is getting harder. So companies that sell exploits to governments are increasingly looking for attacks that target internet routers instead, with one company paying up to $100,000.
Companies that buy and sell exploits, or zero-days, are now willing to offer seven figures for hacks that allow spies and cops to steal WhatsApp, iMessage and other chat app messages.