Linux Kernel Security Flaws
The USN-6549-4 advisory outlines multiple vulnerabilities in the Linux kernel. Firstly, a race condition in the USB subsystem could be exploited...
The USN-6549-4 advisory outlines multiple vulnerabilities in the Linux kernel. Firstly, a race condition in the USB subsystem could be exploited...
Anonymous Arabic has recently unveiled a powerful remote access trojan named Silver RAT, designed to evade security measures and launch hidden applications.
Cyber threat actors are utilizing YouTube videos containing content related to cracked software as a means to entice users into downloading Lumma.
Security researchers have uncovered a vulnerability in thousands of public GitHub repositories that could be exploited for malicious code injection.
CISA has identified and added six new vulnerabilities to its Known Exploited Vulnerabilities Catalog due to evidence of active exploitation.
A security vulnerability in Kyocera's Device Manager product, tracked as CVE-2023-50916, has been disclosed, presenting a risk of exploitation.
IBM issued critical security advisories between January 1 and 7, 2024, addressing vulnerabilities in various products, including Analyst Workflow.
A critical cybersecurity alert surfaces in the aftermath of Orange España's BGP route hijacking incident. Urgent warnings from expert Kevin Beaumont
Cybercriminals are exploiting X's advertising platform to propagate cryptocurrency scams, leading users down the treacherous path of fake airdrops.
Albanian organizations have fallen victim to a recent wave of cyber attacks orchestrated by an Iranian psychological operation group known as Homeland Justice.
© 2024 | CyberMaterial | All rights reserved