The U.S. Treasury announced it was imposing sanctions against a Russian broker of zero-day exploits, its founder and two ...
Codex can exploit vulnerable crypto smart contracts 72% of the time, raising urgent questions about AI-powered cyber offense and defense.
A well-architected NFT marketplace represents a substantial commercial opportunity within the dynamic digital asset landscape. However, the path from initial concept to a fully operational and ...
DeFi lending protocol Moonwell lost $1.78 million after AI code from Claude Opus 4.6 led to an oracle configuration error.
Microsoft details a new ClickFix variant abusing DNS nslookup commands to stage malware, enabling stealthy payload delivery ...
North Korean IT operatives use stolen LinkedIn accounts, fake hiring flows, and malware to secure remote jobs, steal data, ...
Anthropic scored a major endorsement last summer when it won a contract worth up to $200 million from the Defense Department. Now, the AI startup’s relationship with the Pentagon is on the rocks. The ...
Have you ever wished Excel could do more of the heavy lifting for you? Imagine transforming hours of tedious data cleaning and analysis into just a few clicks. That’s exactly what Microsoft’s ...
A ransomware operation known as DeadLock has been observed abusing Polygon blockchain smart contracts to manage and rotate proxy server addresses. DeadLock first appeared in July 2025 and has ...
Truebit lost $26 million after a smart-contract overflow bug let an attacker mint tokens at near-zero cost, sending the TRU price down 99%. A $26 million exploit of the offline computation protocol ...
For 25 years, Pew Research Center has tracked some of the biggest technological shifts in history. Note: We conducted polls via phone from 2000 to 2021; via web and mail in 2023; and via web, mail and ...
University of California, San Francisco investigators measured smartphone app activity during school hours among US adolescents and reported an average of 1.16 hours of use, with social media apps ...