Cybercriminals Exploit SEO Ads to Steal Data
Cybercriminals are increasingly using search engine optimization (SEO) tactics and paid ads to manipulate search engine results. This approach, known as SEO poisoning
Cybercriminals are increasingly using search engine optimization (SEO) tactics and paid ads to manipulate search engine results. This approach, known as SEO poisoning
Fortinet has disclosed a concerning issue where threat actors maintain read-only access to compromised FortiGate devices, even after patching the initial breach.
Hackers are increasingly exploiting Dangling DNS records to take over subdomains, posing serious security risks. This occurs when organizations fail to properly
The Tycoon2FA phishing-as-a-service (PhaaS) platform has evolved with new updates, making it more sophisticated and harder to detect.x
Hackers are using deceptive websites mimicking the Google Play Store to distribute Android malware. These sites, hosted on newly registered domains
Researchers recently revealed how they bypassed Windows Defender’s security using advanced techniques like XOR encryption and direct system calls.
A severe vulnerability, CVE-2025-3102, was discovered in the OttoKit (formerly SureTriggers) plugin for WordPress. This flaw, an authorization bypass,
A new attack targeting cryptocurrency users has emerged through the npm registry, where threat actors upload malicious packages. These packages,
A recent vulnerability in Jenkins Docker images has raised concerns over network security. This vulnerability, caused by the reuse of SSH host keys
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two Linux Kernel vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog.
© 2025 | CyberMaterial | All rights reserved