Hackers Impersonate Pen Testers for Attacks
Hackers are increasingly imitating penetration testing services to mask their malicious activities as legitimate security assessments. By posing...
Hackers are increasingly imitating penetration testing services to mask their malicious activities as legitimate security assessments. By posing...
North Korean hackers, identified as the Kimsuky group, continue to utilize the 'HappyDoor' malware in sophisticated email-based attacks...
WordPress has released version 6.5.5, a critical security update aimed at addressing significant vulnerabilities that could compromise the security...
Hackers are constantly seeking new methods to bypass the ethical and safety measures built into AI systems, allowing them to exploit these systems...
Researchers at K7 Labs have discovered a significant cybersecurity threat aimed at Telegram users, identified as SpyMax. This sophisticated Remote...
Promon's latest research highlights Snowblind, a sophisticated malware targeting banking apps across Southeast Asia. This novel threat...
On June 27, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) issued seven advisories concerning Industrial Control Systems...
Passkey technology is increasingly used to protect online accounts, but many accounts in banking, e-commerce, social media, and...
Unknown threat actors have exploited a now-patched security flaw in Microsoft MSHTML to deliver a surveillance tool called MerkSpy...
A new variant of the Orcinius Trojan has been identified, utilizing a technique called VBA Stomping to obscure its infection. This multi-stage...
© 2025 | CyberMaterial | All rights reserved