Critical Path Traversal Flaws in Rack Ruby
Cybersecurity researchers have unveiled a new Linux rootkit called Curing, which uses the io_uring interface to remain undetected. This rootkit...
Read moreCybersecurity researchers have unveiled a new Linux rootkit called Curing, which uses the io_uring interface to remain undetected. This rootkit...
Read moreCybersecurity researchers have unveiled a new Linux rootkit called Curing, which uses the io_uring interface to remain undetected. This rootkit...
Read moreCybersecurity experts have identified a phishing kit called "SessionShark" that can bypass Office 365's multi-factor authentication (MFA).
Read moreA new cyberattack campaign targets poorly managed Microsoft SQL servers to deploy malicious tools like Ammyy Admin and PetitPotato malware.
Read moreIn 2023, cybersecurity experts uncovered a large-scale compromise involving critical infrastructure enterprises by a threat actor group known as ToyMaker.
Read moreSince early March 2025, suspected Russia-linked hackers have been targeting individuals and organizations tied to Ukraine and human rights.
Read moreA critical vulnerability has been discovered in the FireEye Endpoint Detection and Response (EDR) agent, tracked as CVE-2025-0618.
Read moreCybercriminals have increasingly adopted Google Forms as a tool to conduct stealthy phishing attacks across many industries. Its legitimacy as...
Read moreSonicWall has issued an urgent advisory regarding a high-severity vulnerability in its SSLVPN Virtual Office interface. The vulnerability, tracked as
Read more© 2025 | CyberMaterial | All rights reserved