Fake Play Store Pages Spread Malware
Hackers are using deceptive websites mimicking the Google Play Store to distribute Android malware. These sites, hosted on newly registered...
Read moreHackers are using deceptive websites mimicking the Google Play Store to distribute Android malware. These sites, hosted on newly registered...
Read moreA recent vulnerability in Jenkins Docker images has raised concerns over network security. This vulnerability, caused by the reuse of...
Read moreA severe vulnerability, CVE-2025-3102, was discovered in the OttoKit (formerly SureTriggers) plugin for WordPress. This flaw, an authorization bypass,
Read moreThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two Linux Kernel vulnerabilities to its Known Exploited Vulnerabilities (KEV)...
Read moreResearchers recently revealed how they bypassed Windows Defender’s security using advanced techniques like XOR encryption and direct system calls.
Read moreA new attack targeting cryptocurrency users has emerged through the npm registry, where threat actors upload malicious packages. These packages,
Read moreHackers have exploited a zero-day vulnerability in Gladinet CentreStack’s file-sharing software since March 2025. This flaw, identified as CVE-2025-30406,
Read moreAPT32, also known as OceanLotus, has launched a sophisticated cyberattack using GitHub to target Chinese cybersecurity professionals.
Read moreAkiraBot is an AI-powered spamming framework that has targeted over 80,000 websites since its inception in September 2024.
Read more© 2025 | CyberMaterial | All rights reserved