Hackers Use CrossC2 to Target Linux, macOS
Japan's CERT coordination center (JPCERT/CC) recently observed a new wave of cyberattacks that leveraged a sophisticated command-and-control (C2) framework
Japan's CERT coordination center (JPCERT/CC) recently observed a new wave of cyberattacks that leveraged a sophisticated command-and-control (C2) framework
Zoom recently addressed a critical security vulnerability, identified as CVE-2025-49457, in its Windows client software. The flaw, which
A new and sophisticated Android trojan, dubbed PhantomCard, has been identified by cybersecurity researchers as a significant threat to banking
A severe security vulnerability has been identified and publicly disclosed in the "Database for Contact Form 7, WPforms, Elementor forms"
Cybersecurity researchers have uncovered a new and sophisticated malvertising campaign that is actively infecting users with a multi-stage
The findings from this research serve as a critical reminder that as vehicles become more connected, cybersecurity must be a primary design consideration,
A new jailbreaking method, developed by the security platform NeuralTrust, successfully bypasses OpenAI's latest large language model, GPT-5
A malicious campaign is targeting job seekers in the Web3 space by impersonating a legitimate development team and using a fake interview process to deliver malware.
SafeBreach researchers Or Yair and Shahak Morag have uncovered a significant flaw in the Windows LDAP client code, which they've dubbed Win-DDoS.
A new jailbreaking method, developed by the security platform NeuralTrust, successfully bypasses OpenAI's latest large language model, GPT-5
© 2025 | CyberMaterial | All rights reserved