CISA Identifies Actively Exploited Flaws
The U.S. CISA has identified three actively exploited security flaws, adding them to its Known Exploited Vulnerabilities (KEV) catalog
Read moreThe U.S. CISA has identified three actively exploited security flaws, adding them to its Known Exploited Vulnerabilities (KEV) catalog
Read moreThe U.S. FCC is implementing stringent rules to safeguard consumers against the rising threat of SIM-swapping attacks and port-out fraud
Read moreU.S. cybersecurity and intelligence agencies have issued a joint advisory highlighting the activities of the cybercriminal group known as Scattered...
Read moreA malware botnet known as 'Ddostf' has been identified targeting MySQL servers, repurposing them into a DDoS-as-a-Service platform
Read moreA recent report from Bitdefender reveals a series of novel attack methods that expose vulnerabilities in Google Workspace
Read moreZimbra Collaboration email software fell victim to real-world attacks orchestrated by four distinct hacker groups exploiting a zero-day flaw
Read moreResearchers at Protect AI have discovered nearly a dozen critical vulnerabilities in the infrastructure supporting AI models.
Read moreFortinet has issued a critical alert regarding a severe OS command injection vulnerability in its FortiSIEM report server.
Read moreCyber-criminals have exploited the ongoing crisis in Gaza and Israel through a charity scam, targeting 212 individuals across 88 organizations.
Read more© 2024 | CyberMaterial | All rights reserved