ThroughTek Kalay Flaws Endanger IoT Devices
Researchers discovered four significant vulnerabilities in the ThroughTek Kalay Platform, which powers 100 million IoT-enabled devices. These vulnerabilities...
Researchers discovered four significant vulnerabilities in the ThroughTek Kalay Platform, which powers 100 million IoT-enabled devices. These vulnerabilities...
Hackers leverage the trustworthiness of widely used file formats like XLSX, HTML, and PDF to disseminate malware via phishing emails. Forcepoint...
The Norwegian National Cyber Security Centre (NCSC) advocates for the replacement of SSLVPN/WebVPN solutions with IPsec due to recurring...
Russian cyber operations present a complex landscape, blending state-backed Advanced Persistent Threat (APT) groups with financially motivated...
Microsoft's Threat Intelligence team has identified a concerning trend involving the cybercriminal group Storm-1811, which is exploiting Quick Assist...
The Turla cyber espionage group has recently targeted European Ministries, deploying LunarWeb and LunarMail backdoors to infiltrate diplomatic...
Security researchers have unearthed a sophisticated exploit targeting users of Foxit Reader, a lesser-known PDF viewer, with the aim of stealing sensitive...
A fundamental flaw within the IEEE 802.11 standard exposes vulnerabilities in WPA2 and WPA3 networks, permitting SSID spoofing, a...
Google has swiftly responded to critical vulnerabilities in Chrome with the release of Chrome 125, addressing nine vulnerabilities, four...
Kinsing malware, initially known for targeting Linux cloud servers, has expanded its focus to include Apache Tomcat servers. This shift in target...
© 2025 | CyberMaterial | All rights reserved