SSH-Snake Credential Theft Malware
A recently discovered threat actor is leveraging an open-source network mapping tool called SSH-Snake to locate private keys and traverse victim infrastructure.
A recently discovered threat actor is leveraging an open-source network mapping tool called SSH-Snake to locate private keys and traverse victim infrastructure.
These passkeys, associated with the specific iOS device, offer increased protection against phishing attacks and unauthorized access attempts.
GitHub has taken proactive measures to address a security vulnerability rotating keys to prevent potential exploitation.
How to protect your online privacy? Use a different password for every account, and make sure that each password is long and complex.
An Indian hacker group called 'Indian Cyber Force' launched cyber attacks on Qatar in retaliation for the death sentences handed to eight former Navy officers
Iranian state-sponsored hackers affiliated with the Imperial Kitten group have been identified conducting cyberattacks against Israeli logistics.
Sumo Logic, a leading security and data analytics company, recently revealed a security breach that occurred when their AWS account was compromised
Kinsing threat actors have initiated a new experimental campaign to exploit a recently disclosed Linux privilege escalation vulnerability
A series of destructive cyber attacks targeting Israeli higher education and tech sectors have been ongoing since January 2023.
A malicious campaign called EleKtra-Leak has emerged, focused on exploiting exposed AWS Identity and Access Management (IAM) credentials
© 2024 | CyberMaterial | All rights reserved