Category: EN

What is data masking?

<p>Data masking is a <a href=”https://www.techtarget.com/searchsecurity/Data-security-guide-Everything-you-need-to-know”>security</a> technique that modifies sensitive data in a data set so it can be used safely in a non-production environment. Masking allows software developers, software testers, software application trainers and data analysts to work with…

Romanian Prisoner Hacks Prison IT

The compelling account of a significant cybersecurity incident involving Romania’s penal system unfolded between August and October, The post Romanian Prisoner Hacks Prison IT first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read the original article: Romanian…

Union Cyberattack Raises Concerns

The recent data breach that struck the union Prospect has escalated from a concern for entertainment industry workers to a potential issue of national security. The post Union Cyberattack Raises Concerns first appeared on CyberMaterial. This article has been indexed…

Copilot Flaw Exposes Sensitive Data

A recent report by security researchers highlighted a serious indirect prompt injection vulnerability in Microsoft 365 Copilot that enabled attackers to steal The post Copilot Flaw Exposes Sensitive Data first appeared on CyberMaterial. This article has been indexed from CyberMaterial…

Google Finds New Russian Malware

A Russia-linked hacking group known as COLDRIVER is showing signs of a heightened operations tempo, according to Google Threat Intelligence Group (GTIG). The post Google Finds New Russian Malware first appeared on CyberMaterial. This article has been indexed from CyberMaterial…

PolarEdge Expands Router Botnet

Cybersecurity researchers have recently detailed the inner workings of a potent botnet malware known as PolarEdge. First identified by Sekoia in February 2025 The post PolarEdge Expands Router Botnet first appeared on CyberMaterial. This article has been indexed from CyberMaterial…

SharkStealer Adopts EtherHiding Technique for C2 Communication Evasion

SharkStealer, a Golang-based information stealer, has been observed leveraging the Binance Smart Chain (BSC) Testnet as a covert dead-drop mechanism for command-and-control (C2) communications. By adopting an “EtherHiding” pattern, the malware retrieves encrypted C2 details from smart contracts through Ethereum…

Attackers turn trusted OAuth apps into cloud backdoors

Attackers are increasingly abusing internal OAuth-based applications to gain persistent access to cloud environments, Proofpoint researchers warn. These apps often remain unnoticed for quite some time and allow attackers to maintain access to high-privileged accounts even after passwords are reset…

Phishing Scams Weaponize Common Apps to Fool Users

From fake PDFs to AI voice scams, phishing attacks are evolving fast. Learn key tactics and defenses to protect against fraud, identity theft, and account loss. The post Phishing Scams Weaponize Common Apps to Fool Users appeared first on Security…