GitHub Supply Chain Vulnerability Risks
Security researchers have uncovered a vulnerability in thousands of public GitHub repositories that could be exploited for malicious code injection.
Security researchers have uncovered a vulnerability in thousands of public GitHub repositories that could be exploited for malicious code injection.
CISA has identified and added six new vulnerabilities to its Known Exploited Vulnerabilities Catalog due to evidence of active exploitation.
A security vulnerability in Kyocera's Device Manager product, tracked as CVE-2023-50916, has been disclosed, presenting a risk of exploitation.
IBM issued critical security advisories between January 1 and 7, 2024, addressing vulnerabilities in various products, including Analyst Workflow.
A critical cybersecurity alert surfaces in the aftermath of Orange España's BGP route hijacking incident. Urgent warnings from expert Kevin Beaumont
Cybercriminals are exploiting X's advertising platform to propagate cryptocurrency scams, leading users down the treacherous path of fake airdrops.
Security researchers have raised alarm over daily scans targeting Apache RocketMQ, aiming to exploit critical vulnerabilities in remote command execution
Kyber, a quantum-safe encryption mechanism, faces vulnerabilities collectively known as KyberSlash, allowing potential recovery of secret keys.
The attack strategically targeted susceptible infrastructure with the potential for supply chain and island-hopping attacks.
Security researchers have identified a new macOS backdoor named SpectralBlur, with connections to a malware family associated with North Korean threat actors.
© 2025 | CyberMaterial | All rights reserved