Misconfiguration Lets NTLMv1 Bypass Security
Cybersecurity researchers have identified a significant flaw in the Microsoft Active Directory Group Policy that was designed to disable the deprecated
Cybersecurity researchers have identified a significant flaw in the Microsoft Active Directory Group Policy that was designed to disable the deprecated
Cybersecurity researchers have reported that threat actors are using images to conceal malicious code and distribute malware such
New research by Mathy Vanhoef, a professor at KU Leuven University in Belgium, and PhD student Angelos Beitis, reveals that over 4 million systems
Cybersecurity researchers have uncovered a new malvertising campaign targeting Google Ads users. The threat actor behind this campaign creates
Cybercriminals are exploiting the ongoing California wildfires to launch phishing scams, taking advantage of the chaos and urgency caused by the disaster.
The Lazarus Group, a North Korea-linked cybercriminal organization, has been attributed to a new attack campaign known as Operation 99.
Researchers have uncovered an attack involving a Python-based backdoor used to deploy the RansomHub ransomware across compromised networks.
A newly discovered botnet, consisting of 13,000 compromised MikroTik devices, is taking advantage of misconfigured domain name server (DNS)
New research has revealed a vulnerability in Google’s "Sign in with Google" authentication system that can be exploited through a quirk in domain ownership.
A critical security breach was discovered in the Kong Ingress Controller version 3.4.0 when an attacker gained access to Kong's DockerHub
© 2025 | CyberMaterial | All rights reserved