Tokyo, Japan—Security researchers participating in the Pwn2Own Automotive 2025 hacking contest achieved significant breakthroughs on its second day by exploiting Tesla’s Wall Connector electric vehicle (EV) charger twice and discovering 23 zero-day vulnerabilities in various EV chargers and in-vehicle infotainment (IVI) systems.
Britain launched an investigation into Apple and Google’s smartphone operating systems, app stores and browsers on Thursday, its second use of recently bulked up regulatory powers to scrutinise big tech companies.
A Vulnerability Operations Centre’s structured approach combined with automation’s efficiency can transform overwhelming workloads into actionable insights
The U.S. on Monday imposed sanctions on an extreme right-wing online network, designating the "Terrorgram" collective a terrorist group and accusing it of promoting violent white supremacy.
The U.S. Justice Department said on Tuesday that it has deleted malware planted on more than 4,200 computers by a group of criminal hackers who were backed by the People’s Republic of China.
The aviation agency of the United Nations said it is investigating claims of a network intrusion after a threat actor claimed that they infiltrated its network and stole confidential data.