Hackers Use CrossC2 to Target Linux, macOS
Japan's CERT coordination center (JPCERT/CC) recently observed a new wave of cyberattacks that leveraged a sophisticated command-and-control (C2) framework
Read moreJapan's CERT coordination center (JPCERT/CC) recently observed a new wave of cyberattacks that leveraged a sophisticated command-and-control (C2) framework
Read moreA severe security vulnerability has been identified and publicly disclosed in the "Database for Contact Form 7, WPforms, Elementor forms"
Read moreCybersecurity researchers have uncovered a new and sophisticated malvertising campaign that is actively infecting users with a multi-stage
Read moreA new and sophisticated Android trojan, dubbed PhantomCard, has been identified by cybersecurity researchers as a significant threat to banking
Read moreA new jailbreaking method, developed by the security platform NeuralTrust, successfully bypasses OpenAI's latest large language model, GPT-5
Read moreA malicious campaign is targeting job seekers in the Web3 space by impersonating a legitimate development team and using a...
Read moreThe findings from this research serve as a critical reminder that as vehicles become more connected, cybersecurity must be a...
Read moreSafeBreach researchers Or Yair and Shahak Morag have uncovered a significant flaw in the Windows LDAP client code, which they've...
Read moreThe vulnerability, identified as CVE-2025-55188, is an arbitrary file write flaw present in 7-Zip versions before 25.01. This security issue
Read more© 2025 | CyberMaterial | All rights reserved