Cleo File Transfer Flaw Actively Exploited
A critical vulnerability affecting Cleo's file transfer software, including LexiCom, VLTransfer, and Harmony, is actively being exploited by threat...
A critical vulnerability affecting Cleo's file transfer software, including LexiCom, VLTransfer, and Harmony, is actively being exploited by threat...
Microsoft recently disclosed a critical vulnerability in its Windows Remote Desktop Services, identified as CVE-2024-49115. This...
A significant security vulnerability has been discovered in Apple’s iOS operating system, which compromises the security of user data stored...
A critical vulnerability, CVE-2024-11205, has been discovered in the popular WPForms plugin, which is used by over 6 million active WordPress...
A China-linked cyber espionage group has been attributed to a series of sophisticated cyberattacks targeting business-to-business IT service...
The Shiny Nemesis Cyber Operation represents a significant breach of cloud security, exposing sensitive data and critical credentials through...
Ukraine's Computer Emergency Response Team (CERT-UA) has issued a warning about a sophisticated phishing campaign targeting...
A critical vulnerability, identified as CVE-2024-54143, was discovered in OpenWrt’s Attended Sysupgrade (ASU) service, which allows...
The Ultralytics AI library, a popular Python package widely used for artificial intelligence applications, was recently compromised in a...
Cybersecurity researchers have recently uncovered a sophisticated scam campaign that targets professionals in the Web3 space...
© 2025 | CyberMaterial | All rights reserved