Water Curse Group Hits Developers Via GitHub
A threat actor known as Water Curse has exploited the inherent trust placed in open-source software by many developers. They have weaponized
A threat actor known as Water Curse has exploited the inherent trust placed in open-source software by many developers. They have weaponized
A sophisticated cyber espionage campaign attributed to the XDSpy threat actor has been discovered exploiting a new zero-day vulnerability. This previously
CISA has added a critical iOS zero-click vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, warning of active exploitation. This flaw, tracked
Cybersecurity researchers have uncovered a new threat lurking on the Python Package Index (PyPI) repository: a malicious package designed
A peculiar method has surfaced for embedding images within DNS TXT records, an approach that initially appears unconventional
A significant security flaw, identified as CVE-2025-33108, has been discovered in IBM’s Backup, Recovery, and Media Services (BRMS) for IBM i.
A novel attack technique called TokenBreak can be used to bypass a large language model's safety and content moderation guardrails. Cybersecurity researchers
The threat actors behind the VexTrio Viper Traffic Distribution Service (TDS) have now been linked to other TDS services. These include Help TDS and Disposable TDS
A sophisticated new attack vector exploits a critical flaw in Discord’s invitation system, allowing attackers to hijack expired invite links. This emerging threat leverages
A new attack dubbed 'SmartAttack' uses smartwatches as a covert ultrasonic signal receiver to exfiltrate sensitive data from isolated systems.
© 2025 | CyberMaterial | All rights reserved