New Linux Flaws Allow Easy Root Access
Attackers can now exploit two newly discovered local privilege escalation vulnerabilities to gain full root privileges on major Linux distributions.
Attackers can now exploit two newly discovered local privilege escalation vulnerabilities to gain full root privileges on major Linux distributions.
Cybersecurity researchers are calling attention to a new campaign that is actively exploiting a recently disclosed critical security flaw. This campaign
Cybersecurity researchers are calling attention to a new campaign that is actively exploiting a recently disclosed critical security flaw. This campaign
A threat actor known as Water Curse has exploited the inherent trust placed in open-source software by many developers. They have weaponized
A sophisticated cyber espionage campaign attributed to the XDSpy threat actor has been discovered exploiting a new zero-day vulnerability. This previously
CISA has added a critical iOS zero-click vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, warning of active exploitation. This flaw, tracked
Cybersecurity researchers have uncovered a new threat lurking on the Python Package Index (PyPI) repository: a malicious package designed
A peculiar method has surfaced for embedding images within DNS TXT records, an approach that initially appears unconventional
A significant security flaw, identified as CVE-2025-33108, has been discovered in IBM’s Backup, Recovery, and Media Services (BRMS) for IBM i.
A novel attack technique called TokenBreak can be used to bypass a large language model's safety and content moderation guardrails. Cybersecurity researchers
© 2025 | CyberMaterial | All rights reserved