Category: EN

WCSO Probes Cyber Attack On Network

The Warren County Sheriff’s Office is currently investigating a cyber attack that resulted in the unauthorized access and theft of personal data belonging to employees and their relatives. This article has been indexed from CyberMaterial Read the original article: WCSO…

Ghanaian Man Pleads Guilty In Fraud

A Ghanaian citizen has admitted his involvement in a criminal organization that defrauded American victims of more than $100 million through romance scams and business email schemes. This article has been indexed from CyberMaterial Read the original article: Ghanaian Man…

FBI Probes Surveillance System Breach

The FBI is currently investigating a security breach involving systems dedicated to managing surveillance and wiretap warrants, though the agency maintains the issue has been resolved. This article has been indexed from CyberMaterial Read the original article: FBI Probes Surveillance…

FBI Arrests Suspect In $46M Crypto Theft

A United States government contractor was apprehended on the island of Saint Martin following allegations that he embezzled over $46 million in cryptocurrency from the U.S. This article has been indexed from CyberMaterial Read the original article: FBI Arrests Suspect…

CISA Adds iOS Flaws From Coruna Exploit Kit to KEV List

The nation-state-grade iOS exploit kit targets 23 vulnerabilities affecting iOS 13 to 17.2.1. The post CISA Adds iOS Flaws From Coruna Exploit Kit to KEV List appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

WordPress Membership Plugin Vulnerability Let Attackers Create Admin Accounts

A critical security flaw, identified as CVE-2026-1492, has been found in the User Registration & Membership plugin for WordPress. This vulnerability allows unauthenticated attackers to bypass security controls and create administrator accounts, leading to a complete website takeover. The User Registration & Membership plugin helps website owners create…

Shadow IT: The Initial Access You Didn’t Log

In multiple incident response engagements over the past few years, one detail keeps repeating: the first compromised system wasn’t the one the SOC was watching. It wasn’t visible in the EDR console, it wasn’t tracked in the CMDB, and it…