CISA’s Memory Safety Guide
CISA, NSA, FBI, and global cybersecurity agencies advocate memory safe programming to combat vulnerabilities in "The Case for Memory Safe...
Read moreCISA, NSA, FBI, and global cybersecurity agencies advocate memory safe programming to combat vulnerabilities in "The Case for Memory Safe...
Read moreAtlassian has released critical software fixes addressing four vulnerabilities, including a high-severity deserialization flaw (CVE-2022-1471) in the SnakeYAML library.
Read moreMore than 12 million users unwittingly downloaded SpyLoan Android apps from Google Play, which posed as legitimate financial services offering...
Read moreQualcomm has unveiled details about three high-severity security flaws that faced limited, targeted exploitation in October 2023.
Read moreThe Russia-linked influence operation known as Doppelganger has been actively targeting audiences in Ukraine, the U.S., and Germany.
Read moreA critical vulnerability in a common open-source library used in the Web3 space has been identified, impacting pre-built smart contracts...
Read moreA sophisticated post-exploitation tampering technique has been identified, enabling malicious actors to create a fake Lockdown Mode on compromised iPhones.
Read moreOver 15,000 Go module repositories on GitHub are vulnerable to repojacking attacks, a type of threat that takes advantage of...
Read moreRussian military intelligence hackers, known as Forest Blizzard (APT28/Fancy Bear), are actively exploiting a patched flaw in Microsoft Outlook.
Read more© 2024 | CyberMaterial | All rights reserved