Thousands of iPhones were compromised using the Coruna exploit kit, which chained 23 iOS vulnerabilities into advanced attacks used for espionage and cybercrime.
A China-linked advanced persistent threat actor tracked as UAT-9244 has been targeting telecommunication service providers in South America since 2024, compromising Windows, Linux, and network-edge ...
Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities actively exploited throughout 2025, almost half of them in enterprise software and appliances.
A researcher for Meta, the parent company of Facebook and Instagram, warned executives at the tech giant that there may be upward of 500,000 cases of sexual exploitation of minors per day on the ...
Jeremy has more than 2300 published articles on Collider to his name, and has been writing for the site since February 2022. He's an omnivore when it comes to his movie-watching diet, so will gladly ...
Naduni Madhavika is a full-time PhD candidate at the Tasmanian School of Business and Economics, University of Tasmania, Australia. She is a recipient of the Research Training Program (RTP) ...
OpenAI sent 80 times as many child exploitation incident reports to the National Center for Missing & Exploited Children during the first half of 2025 as it did during a similar time period in 2024, ...
Surge in Online Crimes Against Children Driven by AI and Evolving Exploitation Tactics, NCMEC Reports Mid-year data from the National Center for Missing & Exploited Children reveals alarming surges in ...
Iryna Humenyuk expected job training. Behare Mlinaku expected to learn from experts. Dino Cekic signed up for the opportunity of a lifetime. Supported by Every year, tens of thousands of young people ...
Every year, tech companies flag and suspend thousands of accounts that violate their Terms of Use concerning child sexual exploitation, and report many of those ...