Critical Path Traversal Flaws in Rack Ruby
Cybersecurity researchers have unveiled a new Linux rootkit called Curing, which uses the io_uring interface to remain undetected. This rootkit communicates
Cybersecurity researchers have unveiled a new Linux rootkit called Curing, which uses the io_uring interface to remain undetected. This rootkit communicates
In 2023, cybersecurity experts uncovered a large-scale compromise involving critical infrastructure enterprises by a threat actor group known as ToyMaker.
Cybersecurity experts have identified a phishing kit called "SessionShark" that can bypass Office 365's multi-factor authentication (MFA).
A new cyberattack campaign targets poorly managed Microsoft SQL servers to deploy malicious tools like Ammyy Admin and PetitPotato malware.
Since early March 2025, suspected Russia-linked hackers have been targeting individuals and organizations tied to Ukraine and human rights.
A critical vulnerability has been discovered in the FireEye Endpoint Detection and Response (EDR) agent, tracked as CVE-2025-0618.
GitLab has released critical security updates for its Community and Enterprise Editions to fix multiple high-risk vulnerabilities. These flaws include
Cybercriminals have increasingly adopted Google Forms as a tool to conduct stealthy phishing attacks across many industries. Its legitimacy as a widely
SonicWall has issued an urgent advisory regarding a high-severity vulnerability in its SSLVPN Virtual Office interface. The vulnerability, tracked as
A new cyberattack technique called "Cookie-Bite" enables attackers to bypass multi-factor authentication (MFA) and gain unauthorized access to cloud systems.
© 2025 | CyberMaterial | All rights reserved