Old Finger Protocol Used In Malware
The decades-old 'finger' command, a utility historically used to look up information about users on Unix and Linux systems via the Finger protocol...
The decades-old 'finger' command, a utility historically used to look up information about users on Unix and Linux systems via the Finger protocol...
The threat actor known as PlushDaemon, assessed to be a sophisticated China-aligned group active since at least 2018, has been observed deploying
The default configurations within ServiceNow's Now Assist generative artificial intelligence (AI) platform are vulnerable to exploitation by malicious actors
North Korean state-sponsored cyber actors are exploiting legitimate online services and professional networking sites in a sustained malware distribution
The Iranian state-sponsored threat actor known as APT42 has initiated a focused espionage campaign, dubbed SpearSpecter by the Israel National Digital Agency
Cybersecurity researchers are sounding the alarm regarding an active authentication bypass vulnerability affecting the Fortinet FortiWeb Web Application Firewall (WAF).
A malware botnet known as RondoDox has been observed actively targeting unpatched XWiki instances by leveraging a critical security flaw
Microsoft has acknowledged and is actively investigating a significant installation issue affecting the first Windows 10 Extended Security Update
The cyber threat actor known as Dragon Breath is actively using a multi-stage loader, dubbed RONINGLOADER, to deliver a customized version of the Gh0st RAT
Website security products from Imunify360, designed for Linux-based web hosting environments and used to protect an estimated 56 million sites
© 2025 | CyberMaterial | All rights reserved