Hackers Exploit India’s Loan Apps
Pakistan hackers are exploiting the rising demand for digital financial services by using fake loan applications to target Android users.
Pakistan hackers are exploiting the rising demand for digital financial services by using fake loan applications to target Android users.
A new threat actor known as Blackwood, aligned with China, has been identified in AitM attacks using the NSPX30 implant, as reported by cybersecurity firm ESET.
Arctic Wolf Labs has identified a new threat in the wild known as CherryLoader, a malware loader built on Go masquerading as the legitimate CherryTree.
Cybersecurity researchers have uncovered a critical vulnerability affecting Google Kubernetes Engine (GKE), dubbed Sys:All.
Jenkins, an open-source automation software, have tackled nine security flaws, with special attention given to a critical vulnerability marked as CVE-2024-23897
Google Pixel smartphone owners are grappling with significant problems following the installation of the January 2024 Google Play system update.
Microsoft has unleashed the January 2024 preview update, KB5034204, for Windows 11 versions 22H2 and 23H2, featuring crucial fixes for Bluetooth audio
CISA is urging users to promptly apply these patches, as they address vulnerabilities that could be exploited by cyber threat actors.
CISA has added a new vulnerability, CVE-2023-22527, to its Known Exploited Vulnerabilities Catalog, signaling evidence of active exploitation.
The Cybersecurity and Infrastructure Security Agency (CISA) has released six advisories focusing on Industrial Control Systems (ICS) as of January 23, 2024.
© 2024 | CyberMaterial | All rights reserved