Jenkins Docker Vulnerability Exposes Network
A recent vulnerability in Jenkins Docker images has raised concerns over network security. This vulnerability, caused by the reuse of...
Read moreA recent vulnerability in Jenkins Docker images has raised concerns over network security. This vulnerability, caused by the reuse of...
Read moreResearchers recently revealed how they bypassed Windows Defender’s security using advanced techniques like XOR encryption and direct system calls.
Read moreA severe vulnerability, CVE-2025-3102, was discovered in the OttoKit (formerly SureTriggers) plugin for WordPress. This flaw, an authorization bypass,
Read moreThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two Linux Kernel vulnerabilities to its Known Exploited Vulnerabilities (KEV)...
Read moreAPT32, also known as OceanLotus, has launched a sophisticated cyberattack using GitHub to target Chinese cybersecurity professionals.
Read moreHackers have exploited a zero-day vulnerability in Gladinet CentreStack’s file-sharing software since March 2025. This flaw, identified as CVE-2025-30406,
Read moreAkiraBot is an AI-powered spamming framework that has targeted over 80,000 websites since its inception in September 2024.
Read moreCatB ransomware, identified in late 2022, has emerged as a sophisticated threat to cybersecurity. Known for its stealthy payload execution
Read moreA recent targeted campaign leveraged Server-Side Request Forgery (SSRF) vulnerabilities in websites hosted on AWS EC2 instances. This allowed attackers
Read more© 2025 | CyberMaterial | All rights reserved