A former core infrastructure engineer has admitted to orchestrating a failed extortion plot that involved locking administrators out of hundreds of servers at his New Jersey-based employer. This article has been indexed from CyberMaterial Read the original article: Man Admits…
CERT-EU Reports EC Hack Affecting EU Data
The European Union’s Cybersecurity Service has linked a significant breach of the European Commission’s cloud infrastructure to the TeamPCP threat actor group. This article has been indexed from CyberMaterial Read the original article: CERT-EU Reports EC Hack Affecting EU Data
Free VPNs Leak Data Despite Privacy Claims
Many free Android VPNs function as data collection tools rather than privacy protectors by tracking user activity and requesting invasive permissions. This article has been indexed from CyberMaterial Read the original article: Free VPNs Leak Data Despite Privacy Claims
Hackers Use Venom Stealer to Turn ClickFix Lures Into Full Data Exfiltration Pipelines
A new malware has been quietly spreading across cybercrime networks, and security researchers say it is far more capable than most tools of its kind. Called Venom Stealer, this malware-as-a-service platform does not just harvest credentials — it builds an…
Hackers Use Phorpiex Botnet to Spread Ransomware, Sextortion, and Crypto-Clipping Malware
A botnet that has been running since 2011 is back in the spotlight — not because it is new, but because it keeps reinventing itself. Phorpiex, also known as Trik, has grown from a basic spam tool into a full-scale…
Malicious Chrome Extension “ChatGPT Ad Blocker” Steals ChatGPT Conversations
As OpenAI introduces advertisements to its free tier, cybercriminals are seizing the opportunity to trick users with fake utility tools. Security researchers have discovered a malicious Google Chrome extension named “ChatGPT Ad Blocker.” While it claims to hide unwanted ads,…
The Future of Cyber Warfare and its Impact on Global Business Stability
Cyber warfare is no longer an obscure strategy—it’s the primary arena of global conflict. Explore how Generative AI, “Living off the Land” techniques, and vendor concentration are creating a new era of systemic risk for enterprises. The post The Future of Cyber Warfare and its Impact…
Windows Security app gets Secure Boot certificate status indicators as 2026 expiration approaches
Microsoft’s Secure Boot certificates, issued in 2011, are approaching expiration in 2026. To help IT administrators track whether devices have received replacement certificates, Microsoft has added new status indicators to the Windows Security app, under Device security > Secure Boot.…
Mobile Attack Surface Expands as Enterprises Lose Control
Shadow AI embedded in everyday apps, combined with outdated mobile devices and zero-click exploits, is creating a new and largely unseen mobile risk. The post Mobile Attack Surface Expands as Enterprises Lose Control appeared first on SecurityWeek. This article has…
HIPAA – I Do Not Think That Word Means What You Say It Means
HIPAA is often used as a shorthand for “no,” but the law is a nuanced permissions framework, not a blanket prohibition. Explore why “HIPAA-compliant” software often enforces a caricature of the actual 45 C.F.R. pt. 164. The post HIPAA –…
Why Privileged Access is Becoming the Control Plane for Agentic AI
AI agents are the new “high-speed insiders.” Discover why traditional identity models fail autonomous systems and how Privileged Access Management (PAM) is evolving into a real-time authorization control plane. The post Why Privileged Access is Becoming the Control Plane for Agentic AI…
Ask Me Anything Cyber
A recording from CyberMaterial’s live video This article has been indexed from CyberMaterial Read the original article: Ask Me Anything Cyber
14,000+ F5 BIG-IP APM Instances Exposed Online as Attackers Exploit RCE Vulnerability
Cybersecurity researchers have identified a massive attack surface involving F5 BIG-IP Access Policy Manager (APM) devices. Following a critical severity upgrade to a recently disclosed flaw, over 17,100 instances are currently exposed to the internet, leaving enterprise networks vulnerable to…
CISA Includes TrueConf Security Flaw in KEV Catalog After Exploitation in the Wild
The Cybersecurity and Infrastructure Security Agency (CISA) has officially added a critical security flaw affecting the TrueConf Client to its Known Exploited Vulnerabilities (KEV) catalog. This addition follows clear evidence that threat actors are actively exploiting the bug in real-world…
Kimsuky Uses Malicious LNK Files to Drop Python Backdoor
Kimsuky is using multi-stage malicious LNK files to deploy a Python-based backdoor, adding new intermediate scripts while keeping the final payload logic largely unchanged. The campaign abuses Windows Task Scheduler, Dropbox, and bundled Python runtimes to evade detection and maintain…
React2Shell Exploited in Large-Scale Credential Harvesting Campaign
Using automated scanning and the Nexus Listener collection framework, the hackers compromised over 750 systems. The post React2Shell Exploited in Large-Scale Credential Harvesting Campaign appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: React2Shell…
AI Governance by Terms of Service is Not Governance at All: The Anthropic Case, White House Policy, and the Coming Race to the Bottom
The Anthropic–DoD preliminary injunction exposes the “race to the bottom” in AI governance. Explore why White House policies and corporate terms of service cannot withstand the pressures of global AI dominance. The post AI Governance by Terms of Service is…
Claude Code source leak exploited to spread malware
A source code leak involving Anthropic’s Claude Code tool quickly escalated into a cybersecurity threat, as attackers seized on the exposed files to lure developers into downloading malware disguised as “unlocked” versions of the software. Leaked Claude Code source code…
Axios npm compromise traced to targeted social engineering attack
The recent compromise of the widely used Axios npm package has been confirmed as the result of a targeted social engineering attack. The incident, which briefly exposed developers to malicious code, highlights growing risks within the open-source software supply chain.…
T-Mobile Sets the Record Straight on Latest Data Breach Filing
The cybersecurity incident involved an insider and had a limited impact, the telecoms giant told SecurityWeek. The post T-Mobile Sets the Record Straight on Latest Data Breach Filing appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
CERT-EU Confirms Trivy Supply Chain Attack Led to European Commission AWS Breach
The European Commission’s primary web platform, “europa.eu,” recently suffered a severe data breach stemming from a supply-chain compromise involving the popular open-source vulnerability scanner, Trivy. On April 3, 2026, CERT-EU published an official advisory detailing how a threat actor known…
Hackers Compromised 700+ Next.js Hosts by Exploiting React2Shell Vulnerability
A massive automated credential theft campaign is actively targeting web applications worldwide. Cybersecurity researchers at Cisco Talos have uncovered an operation by a hacker group tracked as UAT-10608, which has already compromised over 700 servers. The attackers are exploiting a…
Multiple TP-Link Vulnerabilities Let Attackers Trigger DoS and Crash Routers
Multiple high-severity vulnerabilities exist in TP-Link’s Tapo C520WS smart security cameras. If exploited, these vulnerabilities may allow adjacent attackers to trigger Denial-of-Service (DoS) conditions, crash the device, or completely bypass authentication. TP-Link has released urgent firmware updates to address these…
Microsoft Forcing Upgrades to Unmanaged Windows 11, Version 24H2
Microsoft has officially begun force-upgrading unmanaged Windows 11 version 24H2 devices to version 25H2, marking the final phase of a staged rollout that relies on machine learning to determine device readiness. The move, confirmed in an updated Windows Release Health…