Windows Defender Bypassed Using XOR
Researchers recently revealed how they bypassed Windows Defender’s security using advanced techniques like XOR encryption and direct system calls.
Researchers recently revealed how they bypassed Windows Defender’s security using advanced techniques like XOR encryption and direct system calls.
A severe vulnerability, CVE-2025-3102, was discovered in the OttoKit (formerly SureTriggers) plugin for WordPress. This flaw, an authorization bypass,
A new attack targeting cryptocurrency users has emerged through the npm registry, where threat actors upload malicious packages. These packages,
A recent vulnerability in Jenkins Docker images has raised concerns over network security. This vulnerability, caused by the reuse of SSH host keys
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two Linux Kernel vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog.
A recent targeted campaign leveraged Server-Side Request Forgery (SSRF) vulnerabilities in websites hosted on AWS EC2 instances. This allowed attackers
AkiraBot is an AI-powered spamming framework that has targeted over 80,000 websites since its inception in September 2024.
Hackers have exploited a zero-day vulnerability in Gladinet CentreStack’s file-sharing software since March 2025. This flaw, identified as CVE-2025-30406,
APT32, also known as OceanLotus, has launched a sophisticated cyberattack using GitHub to target Chinese cybersecurity professionals.
CatB ransomware, identified in late 2022, has emerged as a sophisticated threat to cybersecurity. Known for its stealthy payload execution
© 2025 | CyberMaterial | All rights reserved