Category: EN

32% of top-exploited vulnerabilities are over a decade old

Exploitation timelines continued to compress in enterprise environments, with newly disclosed flaws reaching active use almost immediately and older weaknesses remaining active years after disclosure. (Source: Cisco Talos) Findings from Cisco Talos’ 2025 Year in Review show how attackers combined…

Heritage Bank Breach Exposes SSNs

Heritage Bank, a community institution established in 1927, recently reported a security breach involving an internal file share server that occurred on March 1, 2026. This article has been indexed from CyberMaterial Read the original article: Heritage Bank Breach Exposes…

Moorhead Parks Vendor Hit by Cyberattack

The City of Moorhead recently announced that its third-party Parks and Recreation registration vendor, Sportsman Software, was the target of a cyber attack. This article has been indexed from CyberMaterial Read the original article: Moorhead Parks Vendor Hit by Cyberattack

Russian Hacker Sentenced for Ransomware

A 26-year-old Russian national has been sentenced to 81 months in federal prison for serving as an initial access broker for major cybercrime organizations, including the Yanluowang ransomware group. This article has been indexed from CyberMaterial Read the original article:…

Hacker Steals $24.5M from Resolv

The decentralized finance platform Resolv recently suffered a major security breach where a hacker used a compromised private key to illicitly mint $80 million in uncollateralized USR stablecoins. This article has been indexed from CyberMaterial Read the original article: Hacker…

Dell Wyse Management Flaws Could Lead to Full System Compromise

Security researcher Aleksandr Zhurnakov from PT Security has discovered a critical exploit chain in Dell Wyse Management Suite. By combining seemingly minor logic flaws, an attacker can achieve unauthenticated remote code execution. This attack targets the On-Premises version of the…

TeamPCP Unleashes Iran-Targeted CanisterWorm Kubernetes Wiper

CanisterWorm’s latest evolution turns TeamPCP’s cloud-native toolkit into a geopolitically tuned wiper, capable of bricking entire Kubernetes clusters when it lands on systems configured for Iran. The campaign reuses the same Internet Computer Protocol (ICP) canister C2 and backdoor infrastructure…

Team Mirai and Democracy

Japan’s election last month and the rise of the country’s newest and most innovative political party, Team Mirai, illustrates the viability of a different way to do politics. In this model, technology is used to make democratic processes stronger, instead…

Why Your Monitoring Program Is Letting Attackers Win

There is a version of threat monitoring that looks impressive on paper and fails in practice. High log ingestion volumes. Hundreds of detection rules. A dashboard full of metrics. And yet, attackers dwell in the environment for weeks or months completely…

NVIDIA puts GPU orchestration in community hands

GPU-accelerated AI workloads now run on Kubernetes in the large majority of enterprise environments. Managing those workloads at scale has required specialized tooling that, until now, remained under vendor control. NVIDIA moved to change that at KubeCon Europe in Amsterdam…

Vulnerabilities from years ago still opening doors for attackers

Exploitation timelines continued to compress in enterprise environments, with newly disclosed flaws reaching active use almost immediately and older weaknesses remaining active years after disclosure. (Source: Cisco Talos) Findings from Cisco Talos’ 2025 Year in Review show how attackers combined…