Hackers Exploit Office Forms for Phishing
Cybercriminals are increasingly exploiting Microsoft Office Forms to launch advanced two-step phishing attacks, targeting users' Microsoft...
Cybercriminals are increasingly exploiting Microsoft Office Forms to launch advanced two-step phishing attacks, targeting users' Microsoft...
Cybersecurity researchers at Checkmarx have recently identified a malicious Python package, "lr-utils-lib," that targets macOS developers...
U.S. senators have called on the Federal Trade Commission to investigate how connected car manufacturers handle consumer data, citing...
Cybercriminals recently exploited a vulnerability in Google Workspace accounts, allowing them to bypass email verification during account...
Acronis has issued a warning about a critical security flaw in its Cyber Infrastructure (ACI) platform that allows attackers to bypass authentication...
The FBI, NSA, and CISA have issued a critical warning about the North Korean cyber-espionage group Andariel, which is ramping up its...
Cybersecurity researchers have recently uncovered an ongoing campaign exploiting exposed Selenium Grid services to facilitate illicit...
Progress Software has uncovered a critical security vulnerability in its Telerik Report Server product, posing a serious risk to its users. The...
A newly identified vulnerability, dubbed PKfail, poses a significant security risk to a wide range of computer models by allowing attackers to...
The notorious Chinese Smishing Triad gang has expanded its phishing operations to target iPhone users in India, according to a new report by...
© 2025 | CyberMaterial | All rights reserved