CISA’s Memory Safety Guide
CISA, NSA, FBI, and global cybersecurity agencies advocate memory safe programming to combat vulnerabilities in "The Case for Memory Safe Roadmaps.
CISA, NSA, FBI, and global cybersecurity agencies advocate memory safe programming to combat vulnerabilities in "The Case for Memory Safe Roadmaps.
More than 12 million users unwittingly downloaded SpyLoan Android apps from Google Play, which posed as legitimate financial services offering quick loans.
Qualcomm has unveiled details about three high-severity security flaws that faced limited, targeted exploitation in October 2023.
The Russia-linked influence operation known as Doppelganger has been actively targeting audiences in Ukraine, the U.S., and Germany.
A critical vulnerability in a common open-source library used in the Web3 space has been identified, impacting pre-built smart contracts and several NFT collections
A sophisticated post-exploitation tampering technique has been identified, enabling malicious actors to create a fake Lockdown Mode on compromised iPhones.
Over 15,000 Go module repositories on GitHub are vulnerable to repojacking attacks, a type of threat that takes advantage of username changes and deletions.
Russian military intelligence hackers, known as Forest Blizzard (APT28/Fancy Bear), are actively exploiting a patched flaw in Microsoft Outlook.
Cybersecurity researchers from Cado Security Labs have identified a new variant of the P2Pinfect botnet.
The BlackBerry Threat Research and Intelligence team has uncovered a previously unknown threat actor, referred to as AeroBlade
© 2024 | CyberMaterial | All rights reserved