Red Hat releases security updates for Linux
These updates have been issued to address vulnerabilities found in the Linux kernel across various versions and platforms.
Read moreThese updates have been issued to address vulnerabilities found in the Linux kernel across various versions and platforms.
Read moreCISA established the Known Exploited Vulnerabilities Catalog under the Binding Operational Directive (BOD) 22-01, which requires FCEB agencies.
Read moreAccording to Akamai, PHP-based websites are generally found to have LFI vulnerabilities, and nearly 8 in 10 websites that use...
Read moreA critical flaw in the VM2 JavaScript sandbox has been discovered, allowing attackers to run unsafe code outside the sandbox...
Read moreCybersecurity researchers have revealed the functioning of an elusive loader called "in2al5d p3in4er" used to deliver the Aurora information stealer...
Read moreIranian threat actor that has been active since at least 2017, has been found to be using the SimpleHelp remote...
Read moreState-sponsored hacking group APT28, Sednit, STRONTIUM, and Sofacy, has been deploying custom malware called 'Jaguar Tooth' on Cisco IOS routers.
Read moreThe now-defunct Conti ransomware gang has been found to have collaborated with a threat actor likely affiliated with the FIN7...
Read moreChinese state-sponsored hacking group APT41, has been found abusing the Google GC2 red teaming tool in data theft attacks.
Read more© 2025 | CyberMaterial | All rights reserved