Guidance on Secure Technology Procurement
The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), in collaboration with CISA, the Canadian Centre for Cyber...
The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), in collaboration with CISA, the Canadian Centre for Cyber...
The National Institute of Standards and Technology (NIST) has released version 2.0 of its Cybersecurity Framework (CSF), introducing significant...
The alpitronic Hypercharger EV charger has been found vulnerable to remote exploitation due to its use of default credentials, a flaw cataloged...
Security researchers have uncovered a sophisticated Russian disinformation campaign known as "CopyCop," which leverages generative AI (GenAI)...
Citrix has released a security bulletin detailing a critical vulnerability (CVE-2024-31497) in their Citrix Hypervisor platform. This vulnerability...
Tycoon 2FA, a recently emerged Phishing-as-a-Service (PhaaS) platform, is targeting Microsoft 365 and Gmail accounts using an...
This comprehensive report provides a multifaceted view of the evolving cybersecurity landscape. Through in-depth analysis and visualization, it uncovers...
Reveald has significantly bolstered its cybersecurity capabilities with the acquisition of rThreat and the launch of the Epiphany Validation Engine (EVE)...
Cybersecurity researchers have identified a worrying trend where hackers are exploiting shortcut files to distribute CHM malware. Shortcut files...
The FBI has issued a warning to retail companies across the United States about a hacking group known as Storm-0539, which has been actively...
© 2024 | CyberMaterial | All rights reserved