MuddyWater Hackers Embrace New C2 Tool
MuddyWater, an Iranian threat actor, continues its cyber campaign with the adoption of a new command-and-control (C2) tool called DarkBeatC2....
MuddyWater, an Iranian threat actor, continues its cyber campaign with the adoption of a new command-and-control (C2) tool called DarkBeatC2....
A long-standing vulnerability in the Lighttpd web server, utilized in Baseboard Management Controllers (BMC), has gone unnoticed by major...
Palo Alto Networks issues a warning regarding a critical flaw affecting its PAN-OS software utilized in GlobalProtect gateways, noting...
Node.js exposes a high-severity vulnerability, CVE-2024-27980, posing a significant threat to Windows platforms. This flaw allows attackers to execute...
In a groundbreaking discovery, Akamai researcher Ben Barnea has identified a critical vulnerability, designated as CVE-2023-35628, embedded within...
An ICS advisory has highlighted multiple vulnerabilities in Siemens’ Telecontrol Server Basic equipment. The vulnerabilities, which include...
Apple has issued a widespread alert to iPhone users across 92 countries, cautioning them about potential threats from mercenary spyware attacks.
Threat actors are exploiting GitHub's search feature to trick users into downloading malware-laden repositories disguised as popular projects....
A new strain of the Raspberry Robin malware has emerged, utilizing malicious Windows Script Files (WSFs) as its propagation method since March...
The "eXotic Visit" campaign, a sophisticated Android malware operation, has surfaced, primarily impacting users in South Asia, particularly...
© 2025 | CyberMaterial | All rights reserved