Malicious Extensions Allow Device Hijacking
SquareX recently revealed an alarming attack technique involving browser extensions that can take over a device with minimal user interaction.
SquareX recently revealed an alarming attack technique involving browser extensions that can take over a device with minimal user interaction.
The implications of the "Time Bandit" vulnerability are significant, as it could enable large-scale malicious operations.
A new wave of cyberattacks has emerged, utilizing the Coyote Banking Trojan to target financial institutions across Brazil.
A new variant of the Mirai-based Aquabot botnet, known as Aquabotv3, has been actively exploiting a command injection vulnerability in Mitel SIP phones.
Cybersecurity experts have discovered a new exploit leveraging the Remote Desktop Protocol (RDP), a widely used tool for remote access to Windows systems.
Cybersecurity experts are sounding the alarm over a new SMS-based phishing tool called Devil-Traff, which is being used to carry out large-scale cyberattacks across the globe.
Cybersecurity researchers have recently uncovered a surge in attacks leveraging SparkRAT, a cross-platform Remote Access Trojan (RAT)
The Lazarus Group, a notorious North Korean state-sponsored Advanced Persistent Threat (APT), is behind a large-scale cyberattack campaign known as
Broadcom has identified a critical security vulnerability in its Avi Load Balancer, designated as CVE-2025-22217.
Security researchers from Georgia Institute of Technology and Ruhr University Bochum have uncovered two critical vulnerabilities in Apple’s modern processors
© 2025 | CyberMaterial | All rights reserved