CISA: New Exploited Vulnerability to Catalog
Such vulnerabilities are frequently used by cybercriminals to exploit systems, and pose significant risks to organizations.
Such vulnerabilities are frequently used by cybercriminals to exploit systems, and pose significant risks to organizations.
Ubuntu, a popular open-source operating system, recently published Security Notices to address vulnerabilities in the Linux kernel affecting Ubuntu 16.04 ESM.
Hackers are exploiting the SFX archives feature of compression software like WinRAR to plant backdoors without triggering security agents on the target system
Cybersecurity experts have warned that a group of hackers, known as TACTICAL#OCTOPUS, is using tax-related email lures to spread malware.
The ransomware uses ChaCha20/ECDH encryption when encrypting files, and it will not append any extension, although this can change depending on the victim.
Researchers at Trend Micro have identified a new piece of malware called OpcJacker that has been active since the second half of 2022.
The vulnerability has been used in recent attacks, including a 3CX supply chain and a Zloader malware distribution campaign in January.
A high-severity vulnerability in the Elementor Pro WordPress plugin is being actively exploited by threat actors, according to security firm PatchStack.
Users should also seek technical support for security issues such as resetting an Apple ID password or reviewing recent App Store charges.
The Samba Team, which develops software that enables file and printer, has released security updates to fix vulnerabilities.
© 2024 | CyberMaterial | All rights reserved