N. Korean Hackers Use Supply Chain Attacks
Desktop phone developer 3CX's supply chain attack was the result of a previously unknown attack on a financial trading software maker by North Korean hackers.
Desktop phone developer 3CX's supply chain attack was the result of a previously unknown attack on a financial trading software maker by North Korean hackers.
Google’s Threat Analysis Group (TAG) has identified large-volume phishing campaigns targeting Ukrainian users and aimed at gathering intelligence.
Microsoft has released a security update to address vulnerabilities in the Microsoft Edge Stable Channel. The update is intended to address CVE-2023-2136.
The UK's National Cyber Security Centre (NCSC) has issued an alert warning about the elevated risk of attacks from state-aligned Russian hacktivists.
These updates have been issued to address vulnerabilities found in the Linux kernel across various versions and platforms.
March 2023 was the most active month for cyber attacks in recent years, according to a report by cybersecurity firm NCC Group.
Seattle-based startup SpecterOps has successfully raised $25 million in a Series A funding round to support its ambitious expansion plans.
According to Palo Alto's Unit 42, attackers have an average of six days to exploit unmitigated vulnerabilities before security teams resolve them.
According to Akamai, PHP-based websites are generally found to have LFI vulnerabilities, and nearly 8 in 10 websites that use server-side programming use PHP.
A critical flaw in the VM2 JavaScript sandbox has been discovered, allowing attackers to run unsafe code outside the sandbox environment.
© 2024 | CyberMaterial | All rights reserved