Jenkins Docker Vulnerability Exposes Network
A recent vulnerability in Jenkins Docker images has raised concerns over network security. This vulnerability, caused by the reuse of SSH host keys
A recent vulnerability in Jenkins Docker images has raised concerns over network security. This vulnerability, caused by the reuse of SSH host keys
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two Linux Kernel vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog.
A recent targeted campaign leveraged Server-Side Request Forgery (SSRF) vulnerabilities in websites hosted on AWS EC2 instances. This allowed attackers
AkiraBot is an AI-powered spamming framework that has targeted over 80,000 websites since its inception in September 2024.
Hackers have exploited a zero-day vulnerability in Gladinet CentreStack’s file-sharing software since March 2025. This flaw, identified as CVE-2025-30406,
APT32, also known as OceanLotus, has launched a sophisticated cyberattack using GitHub to target Chinese cybersecurity professionals.
CatB ransomware, identified in late 2022, has emerged as a sophisticated threat to cybersecurity. Known for its stealthy payload execution
Microsoft disclosed the exploitation of a security vulnerability in the Windows Common Log File System (CLFS), tracked as CVE-2025-29824,
A new variant of Neptune RAT, targeting Windows users, is being spread through platforms like YouTube and Telegram. Cybersecurity researchers
The UK's National Cyber Security Centre (NCSC) issued an urgent warning regarding two spyware variants, MOONSHINE and BADBAZAAR.
© 2025 | CyberMaterial | All rights reserved