Wireless Attack Steals Passwords Undetected
Cybersecurity researchers have discovered a new attack method called the Channel Triggered Backdoor Attack, which exploits wireless communication
Cybersecurity researchers have discovered a new attack method called the Channel Triggered Backdoor Attack, which exploits wireless communication
Cybersecurity researchers have raised alarms about a significant surge in suspicious login scans targeting Palo Alto Networks' PAN-OS GlobalProtect gateways.
Outlaw is a persistent Linux malware known for maintaining long-term botnet activities despite its simple design. The malware primarily uses SSH
Cybersecurity researchers have uncovered an updated version of Hijack Loader, a malware loader with new features for evading detection.
A new fileless cryptocurrency mining campaign has targeted over 1,500 exposed PostgreSQL servers. The campaign, attributed to the JINX-0126
Apple has issued an urgent security advisory regarding three critical zero-day vulnerabilities, which have been actively exploited in sophisticated attacks.
Threat actors are increasingly exploiting the "mu-plugins" directory in WordPress to conceal malicious code and maintain persistent access. These must-use
The Konni RAT (Remote Access Trojan) has evolved significantly, leveraging a sophisticated Windows Explorer exploitation technique.
Earth Alux, a China-linked advanced persistent threat (APT) group, has disrupted the cybersecurity landscape since 2023. Initially focusing on Asia-Pacific
Triton Uses Telegram, a RAT with advanced Python-based malware that uses Telegram for command and control, making detection harder
© 2025 | CyberMaterial | All rights reserved