Apple Warns of New Zero Day Vulnerabilities
Apple has issued an urgent security advisory regarding three critical zero-day vulnerabilities, which have been actively exploited in sophisticated attacks.
Apple has issued an urgent security advisory regarding three critical zero-day vulnerabilities, which have been actively exploited in sophisticated attacks.
Threat actors are increasingly exploiting the "mu-plugins" directory in WordPress to conceal malicious code and maintain persistent access. These must-use
The Konni RAT (Remote Access Trojan) has evolved significantly, leveraging a sophisticated Windows Explorer exploitation technique.
Earth Alux, a China-linked advanced persistent threat (APT) group, has disrupted the cybersecurity landscape since 2023. Initially focusing on Asia-Pacific
Triton Uses Telegram, a RAT with advanced Python-based malware that uses Telegram for command and control, making detection harder
A newly discovered Android Trojan named Crocodilus has been found targeting users primarily in Spain and Turkey. The malware operates
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified a new malware variant called RESURGE, which exploits the CVE-2025-0282
Three security bypasses were discovered in Ubuntu Linux’s user namespace restrictions, potentially allowing local attackers to gain administrative privileges.
Cisco Talos has revealed an ongoing cyber campaign by the Gamaredon group, targeting Ukrainian users with malicious LNK files. These files
A new Python-based Remote Access Trojan (RAT) has raised concerns within the cybersecurity community. It uses Discord’s API as a Command and Control (C2)
© 2025 | CyberMaterial | All rights reserved