Zendesk Exploited for Phishing Attacks
A new security report by CloudSEK highlights how attackers can exploit Zendesk’s platform to facilitate phishing attacks and investment scams
A new security report by CloudSEK highlights how attackers can exploit Zendesk’s platform to facilitate phishing attacks and investment scams
Ransomware gangs are increasingly employing sophisticated tactics, such as email bombing and impersonating tech support through Microsoft Teams,
The hacking group DoNot Team, also known as APT-C-35, Origami Elephant, SECTOR02, and Viceroy Tiger, has been linked to new Android
Researchers uncovered critical security vulnerabilities in Azure DevOps, primarily focusing on Server-Side Request Forgery (SSRF) flaws.
A significant security vulnerability, identified as CVE-2024-13454, has been discovered in the OpenVPN Easy-RSA tool, affecting versions 3.0.5 to 3.2.0
The Computer Emergency Response Team of Ukraine (CERT-UA) issued a warning regarding ongoing phishing attacks where threat actors impersonate
A critical vulnerability, CVE-2024-54887, has been discovered in the TP-Link TL-WR940N router, which could allow attackers to remotely execute
Researchers have identified a new adversary-in-the-middle (AitM) phishing kit called Sneaky 2FA, which targets Microsoft 365 accounts to steal credentials
A new Internet of Things (IoT) botnet has been identified as a significant threat, orchestrating large-scale Distributed Denial-of-Service (DDoS)
Cybersecurity researchers have uncovered a critical flaw in the Windows BitLocker encryption system, known as the "bitpixie" exploit.
© 2025 | CyberMaterial | All rights reserved