CISA: New Exploited Vulnerability to Catalog
Such vulnerabilities are frequently used by cybercriminals to exploit systems, and pose significant risks to organizations.
Read moreDetailsSuch vulnerabilities are frequently used by cybercriminals to exploit systems, and pose significant risks to organizations.
Read moreDetailsUbuntu, a popular open-source operating system, recently published Security Notices to address vulnerabilities in the Linux kernel affecting Ubuntu 16.04...
Read moreDetailsHackers are exploiting the SFX archives feature of compression software like WinRAR to plant backdoors without triggering security agents on...
Read moreDetailsCybersecurity experts have warned that a group of hackers, known as TACTICAL#OCTOPUS, is using tax-related email lures to spread malware.
Read moreDetailsThe ransomware uses ChaCha20/ECDH encryption when encrypting files, and it will not append any extension, although this can change depending...
Read moreDetailsResearchers at Trend Micro have identified a new piece of malware called OpcJacker that has been active since the second...
Read moreDetailsThe vulnerability has been used in recent attacks, including a 3CX supply chain and a Zloader malware distribution campaign in...
Read moreDetailsA high-severity vulnerability in the Elementor Pro WordPress plugin is being actively exploited by threat actors, according to security firm...
Read moreDetailsUsers should also seek technical support for security issues such as resetting an Apple ID password or reviewing recent App...
Read moreDetails
© 2025 | CyberMaterial | All rights reserved