NFC Exploited for Mobile Payment Theft
Hackers have developed a sophisticated scheme called Ghost Tap, leveraging near-field communication (NFC) technology to steal funds...
Hackers have developed a sophisticated scheme called Ghost Tap, leveraging near-field communication (NFC) technology to steal funds...
A new version of the Python-based NodeStealer malware is actively targeting Facebook Ads Manager accounts, expanding its scope...
A sophisticated phishing campaign, known as "Gabagool," has recently been discovered by the TRAC Labs team, targeting corporate and...
A critical security vulnerability has been identified in Kubernetes, tracked as CVE-2024-10220, which poses a significant risk to container...
Apple has issued critical security updates for its devices, addressing two zero-day vulnerabilities that have been actively exploited in the wild. The...
The Ngioweb botnet, first identified in 2018, has evolved into a major enabler of residential proxy services like NSOCKS, VN5Socks, and...
A new attack vector utilizing XenoRAT, an open-source remote access tool, has been discovered, leveraging Excel XLL files to bypass traditional...
Misconfigured JupyterLab and Jupyter Notebook instances are increasingly becoming targets for cybercriminals looking to exploit...
A series of critical vulnerabilities in Ubuntu's needrestart package, which is installed by default in Ubuntu Server since version 21.04, have...
Oracle has recently issued a security warning about a high-severity vulnerability affecting its Agile Product Lifecycle Management (PLM) Framework...
© 2024 | CyberMaterial | All rights reserved