Category: EN

Jordanian Man Admits Selling Network Access

A Jordanian man living in Georgia recently pleaded guilty in federal court to operating as a cybercriminal access broker. This article has been indexed from CyberMaterial Read the original article: Jordanian Man Admits Selling Network Access

Ghana Arrests Nigerians Over Cybercrime

Ghanaian authorities have apprehended nine Nigerian nationals in Accra following a multi-agency crackdown on organized cybercrime operations across several residential areas. This article has been indexed from CyberMaterial Read the original article: Ghana Arrests Nigerians Over Cybercrime

AI framework flaws put enterprise clouds at risk of takeover

Update Chainlit to the latest version ASAP Two “easy-to-exploit” vulnerabilities in the popular open-source AI framework Chainlit put major enterprises’ cloud environments at risk of leaking data or even full takeover, according to cyber-threat exposure startup Zafran.… This article has…

Cisco Secure Email Appliance RCE Exploited in Attacks

Cisco says attackers are actively exploiting CVE-2025-20393, a critical RCE flaw in Secure Email appliances. The post Cisco Secure Email Appliance RCE Exploited in Attacks appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…

Raaga Data Breach Exposes 10.2 Million User Records

Indian music streaming platform Raaga suffered a significant data breach in December 2025, compromising the personal information of 10.2 million users. The stolen database was subsequently offered for sale on a prominent underground hacking forum, raising serious concerns about user…

Could ChatGPT Convince You to Buy Something?

Eighteen months ago, it was plausible that artificial intelligence might take a different path than social media. Back then, AI’s development hadn’t consolidated under a small number of big tech firms. Nor had it capitalized on consumer attention, surveilling users…

Resecurity Breach Claims Exposed as Honeypot Deception

  The hackers, who claimed to represent the “Scattered Lapsus$ Hunters” (SLH) group, believed they successfully compromised Resecurity, a cybersecurity firm based in the United States, by exfiltrating their data. Resecurity disputed this by saying they were only able to…

Generative AI for Cybersecurity and Privacy

An in-depth exploration of how generative AI is transforming cyber defense, privacy protection, and digital resilience. This article has been indexed from CyberMaterial Read the original article: Generative AI for Cybersecurity and Privacy

RedHunt-OS

A Linux based threat hunting and DFIR operating system built for blue team operations and adversary detection. This article has been indexed from CyberMaterial Read the original article: RedHunt-OS

Apache Airflow Flaws Expose Sensitive Workflow Data to Potential Attackers

Apache Airflow has patched two separate credential-exposure vulnerabilities in versions before 3.1.6.   The flaws could allow attackers to extract sensitive authentication data embedded in proxy configurations and templated workflow fields through log files and the web UI, potentially compromising network infrastructure and…

Gootloader Malware With Low Detection Rate Evades Most Security Tools

Gootloader malware has resurfaced, employing sophisticated evasion techniques to exploit malformed ZIP archives and obfuscation mechanisms to bypass security detection systems. The Gootloader malware campaign, tracked as a partnership between Storm-0494 and Vanilla Tempest, has returned in late 2025 with…

The Hidden Risk of Orphan Accounts

The Problem: The Identities Left Behind As organizations grow and evolve, employees, contractors, services, and systems come and go – but their accounts often remain. These abandoned or “orphan” accounts sit dormant across applications, platforms, assets, and cloud consoles. The…