EUCLEAK (Exploit Kit) – Malware
The EUCLEAK exploit reveals a critical vulnerability within the cryptographic libraries used in secure elements, affecting devices...
The EUCLEAK exploit reveals a critical vulnerability within the cryptographic libraries used in secure elements, affecting devices...
In the ever-evolving landscape of cyber threats, a new and particularly stealthy malware has emerged, known as sedexp. First identified by Stroz...
StealthVector is a sophisticated and highly effective piece of malware identified as part of a larger cyberespionage campaign...
The Network File System (NFS) protocol, commonly used for file sharing across networked systems, has several security vulnerabilities that...
Researchers from ETH Zurich have uncovered significant security flaws in several widely used end-to-end encrypted (E2EE) cloud storage platforms...
A new ransomware-as-a-service (RaaS) operation known as Cicada3301 has recently emerged, rapidly making its mark by targeting VMware...
Kandji researchers have recently stumbled upon a novel malicious Mach-O binary skillfully crafted to mimic the functionalities of spyware and...
Researchers from Avast have discovered a critical flaw in the DoNex ransomware’s cryptographic schema, enabling them to develop a decryptor...
XMRig is a widely recognized cryptominer malware primarily designed to mine Monero (XMR), a popular cryptocurrency known for...
A security researcher, Antoon Purnal, uncovered a timing leak in the Kyber key encapsulation mechanism (KEM), a cryptographic standard...
© 2025 | CyberMaterial | All rights reserved