Interview Campaign Exploits JSON Storage
North Korean state-sponsored cyber actors are exploiting legitimate online services and professional networking sites in a sustained malware distribution
North Korean state-sponsored cyber actors are exploiting legitimate online services and professional networking sites in a sustained malware distribution
The Iranian state-sponsored threat actor known as APT42 has initiated a focused espionage campaign, dubbed SpearSpecter by the Israel National Digital Agency
Cybersecurity researchers are sounding the alarm regarding an active authentication bypass vulnerability affecting the Fortinet FortiWeb Web Application Firewall (WAF).
A malware botnet known as RondoDox has been observed actively targeting unpatched XWiki instances by leveraging a critical security flaw
Microsoft has acknowledged and is actively investigating a significant installation issue affecting the first Windows 10 Extended Security Update
The cyber threat actor known as Dragon Breath is actively using a multi-stage loader, dubbed RONINGLOADER, to deliver a customized version of the Gh0st RAT
Website security products from Imunify360, designed for Linux-based web hosting environments and used to protect an estimated 56 million sites
Socket’s Threat Research Team identified a malicious Chrome extension called “Safery: Ethereum Wallet” that operates as a seed phrase thief
Jacob Krut, a security engineer and bug bounty hunter at Open Security, discovered a significant vulnerability while developing a custom GPT
Google and Mozilla promptly issued new security updates for Chrome and Firefox on Tuesday to address a range of high-severity vulnerabilities
© 2025 | CyberMaterial | All rights reserved