European Parliament Phones Hacked
Evidence of hacking detected on phones owned by members of the European Parliament's Subcommittee on Security and Defense has sparked concern.
Evidence of hacking detected on phones owned by members of the European Parliament's Subcommittee on Security and Defense has sparked concern.
A significant cellphone outage disrupted users across the US early on Thursday, impacting major carriers such as AT&T, T-Mobile, and Verizon.
Several vulnerabilities have been identified in the Joomla content management system, posing a risk of arbitrary code execution on affected websites.
Mustang Panda, a China-linked threat actor, deploys a customized variant of the PlugX backdoor, known as DOPLUGS, across various Asian countries.
A recently discovered threat actor is leveraging an open-source network mapping tool called SSH-Snake to locate private keys and traverse victim infrastructure.
Cybersecurity researchers have identified two critical authentication bypass flaws in widely-used Wi-Fi software present in Android, Linux, and ChromeOS devices
Researchers have identified a concerning trend wherein hackers are leveraging Google Cloud Run to distribute banking trojans like Astaroth, Mekotio, and Ousaban
Cole & Van Note, a leading consumer rights law firm, has initiated an investigation into Air Methods following a recent data breach. The breach, which
Insomniac Games, a subsidiary of Sony, faces the aftermath of a Rhysida ransomware attack that occurred in November, leading to the compromise of personal
Crossroads Equipment Lease & Finance, LLC informs its valued customers about a cybersecurity incident that occurred on April 2, 2023. The breach
© 2024 | CyberMaterial | All rights reserved