Tag: EN

When Spreadsheets Break Security

Cybersecurity risk management is under growing scrutiny—not just from internal stakeholders but from regulators, auditors, and customers. Yet many organizations still rely on outdated tools like spreadsheets to track and… The post When Spreadsheets Break Security appeared first on Cyber…

Infostealer Targeting Android Devices, (Thu, Oct 23rd)

Infostealers landscape exploded in 2024 and they remain a top threat today. If Windows remains a nice target (read: Attackers' favorite), I spotted an Infostealer targeting Android devices. This sounds logical that attackers pay attention to our beloved mobile devices…

Salt Typhoon Hacks European Telecom

China-linked espionage group Salt Typhoon successfully breached a European telecommunications firm in July 2025, continuing a widespread global campaign The post Salt Typhoon Hacks European Telecom first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read the original…

Ransomware Hits Jewett Cameron

Oregon-based Jewett-Cameron Company, a provider of fencing, specialty wood, gardening products, and accessories for dogs like kennels and crates The post Ransomware Hits Jewett Cameron first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read the original article:…

MuddyWater Launches Global Spying

The Iranian nation-state threat group known as MuddyWater has launched a new, targeted campaign across the Middle East and North Africa (MENA) region The post MuddyWater Launches Global Spying first appeared on CyberMaterial. This article has been indexed from CyberMaterial…

Fake Zoom Calls Target Ukraine Aid

The PhantomCaptcha cyberattack, detailed in a new report by SentinelOne, represents a highly calculated and sophisticated operation targeting organizations The post Fake Zoom Calls Target Ukraine Aid first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read the…

Gift Card Heist Via Cloud Hackers

Cybersecurity researchers have recently detailed the activities of a cybercriminal operation dubbed Jingle Thief, a group focused on gift card The post Gift Card Heist Via Cloud Hackers first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read…