AWS Default Roles Expose Cloud to Attacks
Security researchers uncovered major flaws in default IAM roles used by AWS services like SageMaker, Glue, EMR, and Ray. These roles often grant excessive
Security researchers uncovered major flaws in default IAM roles used by AWS services like SageMaker, Glue, EMR, and Ray. These roles often grant excessive
Gremlin Stealer, a new infostealer variant, has emerged, gaining attention for its advanced capabilities. According to Palo Alto Networks' Unit 42
A recently discovered vulnerability in Docker Desktop for macOS is raising alarms within the security community. The flaw, identified as CVE-2025-4095, results from
A critical security vulnerability has been identified in Samsung's MagicINFO digital signage management platform. Tracked as CVE-2024-7399, this flaw
A significant vulnerability, CVE-2025-31650, has been discovered in Apache Tomcat, a widely used Java application server. This high-severity flaw
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two exploited flaws to its KEV catalog. These vulnerabilities affect Commvault
Offensive Security urged Kali Linux users to manually install a new repository signing key to avoid system update failures. This warning followed the loss
A recent surge in cyber reconnaissance has raised alarms across thousands of organizations. GreyNoise, a global threat intelligence platform, reported
A severe vulnerability in the Linux kernel's Virtual Socket (vsock) implementation, identified as CVE-2025-21756, has been discovered.
The ELENOR-Corp ransomware group has recently targeted the healthcare sector with a new variant of Mimic ransomware. This version, identified
© 2025 | CyberMaterial | All rights reserved