Apple doubles its biggest bug bounty reward to $2 million
Apple enhances its Security Bounty program, now offering up to $2 million for critical exploit chains and over $5 million for severe vulnerabilities.
posted on 10/10/2025Apple enhances its Security Bounty program, now offering up to $2 million for critical exploit chains and over $5 million for severe vulnerabilities.
posted on 10/10/2025South Korea, a tech leader, grapples with increasing cyberattacks due to fragile defenses and uncoordinated responses. Are they ready to face the hackers?
posted on 10/05/2025A hacking group has claimed responsibility for stealing 1 billion records from Salesforce customers, threatening to release the data if a ransom is not paid.
posted on 10/03/2025Oneleet secures $33M to streamline security compliance. Aiming to replace security theater with real protection for businesses. A deeper look at their approach.
posted on 10/02/2025Ex-Google security experts raise $13M to develop AI-powered solution that blocks email threats before they reach your inbox, offering a new layer of email protection.
posted on 09/10/2025Reolink introduces the TrackFlex Floodlight WiFi camera with advanced AI, raising questions about the balance between security and personal privacy.
posted on 09/06/2025Google denies recent reports of a widespread Gmail security issue, reassuring users about its protection measures against phishing and malware attempts.
posted on 09/02/2025North Korean spies are infiltrating Western companies by posing as remote IT workers, aiming to generate funds for the regime's nuclear weapons program.
posted on 08/04/2025US and European authorities have successfully seized the servers of the BlackSuit ransomware gang in a joint operation, disrupting their malicious activities.
posted on 08/01/2025Sensitive customer data compromised in a recent cyberattack on Allianz Life. Social Security numbers were stolen, raising concerns about identity theft.
posted on 07/31/2025Allianz Life confirms a data breach affecting a large number of customers. Hackers stole personal information via social engineering.
posted on 07/26/2025Bug bounty programs are facing a new challenge: a flood of AI-generated reports that claim to find vulnerabilities but are actually bogus. Learn more about this problem and its potential solutions.
posted on 07/24/2025