Cyber Insurance Claims Fall Despite Growth
A new report by Databarracks reveals a surprising trend in the cyber insurance landscape, where the uptake of policies is on the rise while the number...
A new report by Databarracks reveals a surprising trend in the cyber insurance landscape, where the uptake of policies is on the rise while the number...
Group-IB, a leader in cybersecurity technologies, recently announced a global partnership with SecurityHQ, an independent Managed Security Service Provider...
A recent malspam campaign, observed by Symantec, uses RedLine Stealer malware, impersonating a prominent Vietnamese oil and gas company to infiltrate...
On August 19th, CISA added CVE-2024-23897 to its catalog of Known Exploited Vulnerabilities, highlighting a severe risk associated with the Jenkins...
Cybersecurity experts have identified a new Linux malware named sedexp, attributed to a financially driven threat group. This malware uses udev rules...
Hawk Eye, a newly identified ransomware actor, has begun to make its presence known. This actor encrypts files and adds a random four-character extension...
Threat actors are increasingly turning to a tool called Xeon Sender to execute large-scale SMS phishing (smishing) and spam campaigns...
Cybercriminals are increasingly targeting beneficiaries of India's Prime Minister Kisan Yojana with deceptive tactics, distributing fake app links...
Researchers at the University of Rochester have unveiled a groundbreaking technique named RollingCache to defend against cache side-channel...
Researchers have uncovered a significant vulnerability in the Linux kernel's dmam_free_coherent() function, designated as CVE-2024-43856...
© 2025 | CyberMaterial | All rights reserved