Hackers Abuse Google Cloud for Phishing
In recent revelations, the hacker groups PINEAPPLE and FLUXROOT have been found exploiting Google Cloud’s serverless infrastructure...
In recent revelations, the hacker groups PINEAPPLE and FLUXROOT have been found exploiting Google Cloud’s serverless infrastructure...
The Braodo Stealer, a sophisticated piece of malware originating from Vietnam, has recently caught the attention of cybersecurity experts...
The Okta Browser Plugin, utilized by over 5 million users across popular browsers such as Chrome, Edge, Safari, and Firefox, has been found...
ESET researchers have uncovered a critical zero-day vulnerability in the Telegram messaging app for Android, named "EvilVideo," which has the...
On July 23, 2024, Hitachi Energy released an advisory for vulnerabilities affecting its IED Connectivity Packages and PCM600 products...
CISA released an advisory on July 23, 2024, detailing vulnerabilities in Hitachi Energy's AFS and AFR series products. The advisory, identified...
The National Instruments (NI) LabVIEW software installed on remote Windows hosts is affected by several critical vulnerabilities. These...
A stack-based buffer overflow vulnerability has been discovered in the NI I/O Trace Tool, identified as CVE-2024-5602. This flaw arises from...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog with...
Microsoft has released the July 2024 preview update for Windows 10, version 22H2, identified as KB5040525. This update is...
© 2025 | CyberMaterial | All rights reserved