P2PInfect Attacks Redis with Ransomware
P2PInfect, initially a dormant peer-to-peer malware botnet, has recently become active by deploying both ransomware and a cryptominer in...
P2PInfect, initially a dormant peer-to-peer malware botnet, has recently become active by deploying both ransomware and a cryptominer in...
VMware has revealed three critical vulnerabilities in its ESXi hypervisor, identified as CVE-2024-37085, CVE-2024-37086, and CVE...
Malware operators are increasingly exploiting legitimate cloud services for malicious campaigns, as detailed in a report by Fortinet’s FortiGuard...
The Cybersecurity and Infrastructure Security Agency (CISA) issued two Industrial Control Systems (ICS) advisories on June 25, 2024...
CSHARP-STREAMER, a Remote Access Trojan (RAT), was uncovered during an investigation of a ransomware attack involving Metaencryptor....
A new malware tool named k4spreader, created by the Chinese mining gang "8220," was discovered in June 2024. Written in Cgo and packed...
Fortra FileCatalyst Workflow, a web-based file exchange platform, is affected by a critical SQL injection vulnerability identified as CVE-2024...
A critical authentication bypass vulnerability (CVE-2024-5806) has been discovered in Progress Software’s MOVEit Transfer and MOVEit Cloud...
In early 2021, IT security consultant Egidio Romano discovered a Zip Slip vulnerability in JFrog’s Artifactory, a leading software repository manager...
A previously undocumented Chinese-speaking threat actor named SneakyChef has been linked to an espionage campaign targeting government...
© 2024 | CyberMaterial | All rights reserved