Vortax App Used in Crypto Theft Campaign
Insikt Group has uncovered a widespread malicious campaign targeting cryptocurrency users through a fake virtual meeting software called...
Insikt Group has uncovered a widespread malicious campaign targeting cryptocurrency users through a fake virtual meeting software called...
Threat actors are exploiting a SolarWinds Serv-U path-traversal vulnerability (CVE-2024-28995) using publicly available proof-of-concept...
A malvertising campaign recently discovered by Rapid7 has been leveraging trojanized installers for popular software such as Google Chrome...
In a significant cybersecurity revelation, the Trellix IPS Manager has been identified with a critical vulnerability that poses a serious risk to network...
Several vulnerabilities have been discovered in Toshiba e-STUDIO Multi-Function Printers (MFPs), impacting 103 models globally. These...
Criminals in Ho Chi Minh City are using AI deepfake technologies to blackmail men by creating fake accounts of supermodels. The local...
Data breaches pose a severe threat to Australian businesses, with the potential for irreversible brand damage. Cybersecurity expert Michael Murphy...
Russian propagandists are circulating false information claiming that Ukraine will become a buffer state or an exclusion zone following the war....
Recently discovered by eSentire's Threat Response Unit, SolarMarker malware is posing a significant threat by masquerading as the legitimate job...
A recent addition to the ransomware landscape, OPIX spreads through phishing emails and drive-by downloads, encrypting files...
© 2025 | CyberMaterial | All rights reserved