Exploitation of Kubernetes Clusters
Malicious actors have been exploiting vulnerable Kubernetes (K8s) clusters to deploy cryptocurrency miners and backdoors, according to a report
Malicious actors have been exploiting vulnerable Kubernetes (K8s) clusters to deploy cryptocurrency miners and backdoors, according to a report
A recent surge of cyberattacks has revealed the deployment of EvilProxy, a sophisticated phishing tool, in a massive scheme targeting cloud accounts
Network transmissions of Sogou Input Method, a widely-used Chinese technology company serving over 455 million users monthly
Cybersecurity researchers have recently unveiled a significant discovery involving 11 living-off-the-land binaries-and-scripts (LOLBAS)
Threat actors have been discovered exploiting Cloudflare Tunnels to establish covert communication pathways from compromised systems
A recent discovery by a senior research scientist at Google has unveiled a critical vulnerability named Downfall that exploits Intel CPUs
Researchers have uncovered a powerful new transient execution attack dubbed 'Inception,' capable of leaking privileged data from all AMD Zen CPUs
A recent malware campaign has emerged, employing malicious OpenBullet configuration files, aiming to deliver a remote access trojan
McAfee's Mobile Research Team have uncovered a troubling new adware campaign that specifically targets Korean Android users.
The messages falsely claim that the recipient's child or family member has experienced phone damage and provide a new mobile number for contact.
© 2025 | CyberMaterial | All rights reserved