ImageMagick Improper Input Validation Flaw
ImageMagick has a critical vulnerability in multiple coders, including EPHEMERAL, HTTPS, MVG, MSL, TEXT, SHOW, WIN, and PLT. This flaw allows remote attacker...
ImageMagick has a critical vulnerability in multiple coders, including EPHEMERAL, HTTPS, MVG, MSL, TEXT, SHOW, WIN, and PLT. This flaw allows remote attacker...
IBM has recently issued a critical security bulletin addressing significant vulnerabilities in its MQ Operator and Queue Manager container images...
Researchers have recently introduced a novel side-channel attack called "RAMBO" (Radiation of Air-gapped Memory Bus for Offense)...
A new and sophisticated Android malware, named SpyAgent, has emerged as a significant threat to users in South Korea and the U.K...
A recent security analysis conducted by Orca has identified a significant vulnerability within GitHub Actions, a widely-used continuous integration...
The TIDRONE espionage group, a previously undocumented cyber threat actor, has surfaced in 2024 with a focused campaign targeting...
Air-gapped networks isolate systems from the internet to protect sensitive data in industries like finance, healthcare, and defense. Despite this high level...
A new sextortion scam variant is targeting spouses by claiming to have proof of infidelity. The email demands payment to prevent the alleged evidence from...
Fog ransomware, previously aimed at education, is now threatening finance firms with advanced attacks. In August 2024, attackers breached a mid-sized...
The Group-IB Digital Forensics and Incident Response (DFIR) team has recently uncovered a sophisticated technique that abuses Linux's Pluggable...
© 2025 | CyberMaterial | All rights reserved