Subscribe
Sign in
Home
Notes
Chat
Documents
Tools
Books
Jobs
Events
Cyber Briefing
Alerts
Incidents
News
Threats
Ask an Expert
About
Latest
Top
Discussions
American Surveillance: Intelligence, Privacy, and the Fourth Amendment
A nuanced historical and legal analysis of surveillance, intelligence power, and constitutional privacy protections.
11 hrs ago
•
CyberMaterial
Cyber Briefing: 2026.02.20
ClickFix spreads MIMICRAT, VoIP zero-day enables eavesdropping, Gemini-powered malware emerges, hospitals and chip firms hit, global scam arrests surge.
13 hrs ago
•
CyberMaterial
1
ClickFix Uses Hacked Sites For MIMICRAT
Security researchers have uncovered a sophisticated ClickFix campaign that hijacks legitimate websites to infect users with a novel remote access trojan…
13 hrs ago
FBI Reports 1,900 ATM Jackpotting Incidents
The FBI has issued a warning regarding a significant rise in ATM jackpotting, noting that over twenty million dollars was stolen in 2025 alone.
13 hrs ago
1
Ukrainian Gets 5 Years In IT Fraud Case
A 29-year-old Ukrainian man received a five-year prison sentence for managing a sophisticated identity theft operation that helped North Korean IT…
13 hrs ago
Africa Scam Crackdown Nets 651 Arrests
Sixteen African nations collaborated in an international crackdown on cybercrime known as Operation Red Card 2.0, resulting in 651 arrests and the…
13 hrs ago
Japanese Chip Supplier Hit By Ransomware
Advantest, a major Japanese provider of semiconductor testing tools, is currently investigating a ransomware attack that compromised parts of its…
13 hrs ago
Cyberattack Shuts UMMC Clinics
The University of Mississippi Medical Center has suspended clinic operations and canceled appointments following a cybersecurity attack that disabled…
13 hrs ago
Hackers Stole 2 Quadrillion Bytes
Israel now ranks as one of the top three most targeted nations for cyber warfare globally according to national authorities.
13 hrs ago
PromptSpy Abuses Gemini For Persistence
Researchers have identified PromptSpy, the first Android malware to utilize Google's Gemini AI to maintain persistence on infected devices.
13 hrs ago
Grandstream VoIP Flaw Enables Eavesdropping
A critical security flaw in Grandstream GXP1600 series VoIP phones allows remote attackers to gain full root access without needing any login…
13 hrs ago
CryptoCore / UNC1069
North Korean financially motivated threat actors, AI-Enabled Social Engineering and the New Face of Crypto Intrusions.
Feb 19
•
CyberMaterial
and
Sofia
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts