Google Fixes GerriScary Supply Chain Flaw
Cybersecurity researchers are calling attention to a new campaign that is actively exploiting a recently disclosed critical security flaw. This...
Read moreCybersecurity researchers are calling attention to a new campaign that is actively exploiting a recently disclosed critical security flaw. This...
Read moreCybersecurity researchers are calling attention to a new campaign that is actively exploiting a recently disclosed critical security flaw. This...
Read moreAttackers can now exploit two newly discovered local privilege escalation vulnerabilities to gain full root privileges on major Linux distributions.
Read moreA threat actor known as Water Curse has exploited the inherent trust placed in open-source software by many developers. They...
Read moreA sophisticated cyber espionage campaign attributed to the XDSpy threat actor has been discovered exploiting a new zero-day vulnerability. This...
Read moreCISA has added a critical iOS zero-click vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, warning of active exploitation. This...
Read moreCybersecurity researchers have uncovered a new threat lurking on the Python Package Index (PyPI) repository: a malicious package designed
Read moreA peculiar method has surfaced for embedding images within DNS TXT records, an approach that initially appears unconventional
Read moreA significant security flaw, identified as CVE-2025-33108, has been discovered in IBM’s Backup, Recovery, and Media Services (BRMS) for IBM...
Read more© 2025 | CyberMaterial | All rights reserved