Windows Task Scheduler Flaws Enable Attacks
Researchers have identified four vulnerabilities in Windows task scheduling, posing significant risks of privilege escalation and log tampering.
Researchers have identified four vulnerabilities in Windows task scheduling, posing significant risks of privilege escalation and log tampering.
Security researchers have uncovered new activities attributed to Mustang Panda, a China-sponsored espionage group. Known for targeting government
Apple released security updates for iOS, iPadOS, macOS Sequoia, tvOS, and visionOS to address two actively exploited vulnerabilities.
Researchers from Palo Alto Networks uncovered a series of malicious spam campaigns using Agent Tesla malware. The attack starts with
Chinese-linked threat actor UNC5174 has launched a new campaign targeting Linux and macOS systems using SNOWLIGHT malware and the VShell
Attackers are increasingly exploiting Node.js, a widely used open-source JavaScript runtime, to deliver advanced malware and steal sensitive data.
Russian cyberespionage group Midnight Blizzard, also known as Cozy Bear or APT29, is behind a new spear-phishing campaign targeting European diplomatic
A malicious package named ccxt-mexc-futures was uploaded to the PyPI repository, targeting users of the MEXC cryptocurrency exchange.
North Korea-linked hacker group Slow Pisces has been linked to a new targeted campaign against cryptocurrency developers.
Researchers have uncovered ResolverRAT, a sophisticated remote access trojan targeting healthcare and pharmaceutical sectors.
© 2025 | CyberMaterial | All rights reserved