Hackers Exploit AWS for Phishing Attacks
Hackers are exploiting Amazon Web Services (AWS) misconfigurations to launch phishing campaigns using Amazon Simple Email Service (SES) and WorkMail, according
Hackers are exploiting Amazon Web Services (AWS) misconfigurations to launch phishing campaigns using Amazon Simple Email Service (SES) and WorkMail, according
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a significant vulnerability in Microsoft Windows, tracked as CVE-2018-8639.
A recent cybersecurity discovery has revealed a large-scale phishing campaign that exploits fake CAPTCHA images in PDF documents to distribute Lumma
Microsoft has recently discovered five vulnerabilities in the BioNTdrv.sys driver used by Paragon Partition Manager, one of which is actively exploited
Security researchers have uncovered a sophisticated kernel exploit named Trigon, leveraging a critical integer overflow vulnerability (CVE-2023-32434)
Security researchers have uncovered a new cyber campaign where the Njrat remote access trojan (RAT) is being used to exploit Microsoft’s Dev Tunnels service.
Security researchers have discovered a coordinated attack campaign targeting Google’s advertising ecosystem and PayPal’s merchant tools
The newly discovered nRootTag attack has exposed over 1.5 billion Apple devices, including iPhones, iPads, Apple Watches, and Macs,
The Lotus Blossom hacker group, also known by several aliases such as Spring Dragon, Billbug, and Thrip, has been identified by Cisco Talos
A new variant of the Vo1d malware botnet has become one of the largest seen in recent years, infecting over 1.5 million Android TV devices across 226 countries.
© 2025 | CyberMaterial | All rights reserved