Trojan Threats on Google Cloud
Researchers have identified a concerning trend wherein hackers are leveraging Google Cloud Run to distribute banking trojans like Astaroth, Mekotio, and Ousaban
Researchers have identified a concerning trend wherein hackers are leveraging Google Cloud Run to distribute banking trojans like Astaroth, Mekotio, and Ousaban
Google and Mozilla have addressed high-severity memory safety vulnerabilities in their browsers, Chrome and Firefox, respectively
Cybersecurity firm Resecurity has exposed a growing trend of cyber threats targeting elections, with the latest incident involving the sale of voter data...
The Cactus ransomware group has plunged French energy giant Schneider Electric into turmoil, announcing its success in pilfering a substantial...
Mitsubishi Electric has disclosed a critical vulnerability affecting a range of their Electrical Discharge Machines. The flaw, identified as CVE-2023-21554...
CISA's recent alert discloses critical vulnerabilities in the Industrial Control Systems Network Protocol Parsers' Ethercat Plugin for Zeek...
GitLab has issued security releases, versions 16.9.1, 16.8.3, and 16.7.6, for both GitLab Community Edition (CE) and Enterprise Edition (EE)...
(AV24-104), the Canadian Centre for Cyber Security alerts users and administrators about critical vulnerabilities in various Atlassian products...
ACEMAGIC has publicly admitted an unforeseen occurrence involving the distribution of Redline spyware and Bladabindi backdoor Trojan.
These attacks demonstrate the ability to inject voice commands and induce physical damage to devices and nearby items by leveraging electromagnetic interference
© 2024 | CyberMaterial | All rights reserved