Hackers Recruit Insiders To Bypass Security

Threat actors are increasingly bypassing technical defenses by recruiting disgruntled employees through social media and email with promises of financial gain. This article has been indexed from CyberMaterial Read the original article: Hackers Recruit Insiders To Bypass Security

GRC Glossary A–Z (2026 Edition)

An A–Z reference of essential GRC terms with clear, practical definitions to support cybersecurity work, audits, interviews, and certifications. This article has been indexed from CyberMaterial Read the original article: GRC Glossary A–Z (2026 Edition)

Cyberattackers Use Fake RTO Challan Alerts to Spread Android Malware

Indian users’ trust in government services through a sophisticated Android malware campaign that impersonates Regional Transport Office (RTO) challan notifications. This campaign represents an evolution from previous RTO-themed malware, featuring advanced anti-analysis techniques, a modular three-stage architecture, and a structured…

Moxa Switches Vulnerability Enables Unauthorized Access through Authentication Bypass

Moxa has released a critical security advisory addressing a severe vulnerability affecting multiple series of its industrial Ethernet switches. Tracked as CVE-2024-12297, this flaw allows remote attackers to bypass authentication mechanisms, potentially granting unauthorized access to critical network infrastructure. With a CVSS…

n8n Vulnerability Allows Remote Attackers to Hijack Systems via Malicious Workflow Execution

n8n has released urgent security updates to address a critical vulnerability that exposes host systems to Remote Code Execution (RCE). Tracked as CVE-2026-25049, this flaw allows authenticated attackers to escape the expression evaluation sandbox and execute arbitrary system commands, potentially leading…

ShadowSyndicate Leverages Server Transition Technique in Latest Ransomware Attacks

ShadowSyndicate, a sophisticated cybercrime cluster first identified in 2023, has evolved its infrastructure management tactics by implementing a previously unreported server transition technique. This method involves rotating SSH fingerprints across multiple servers to obscure operational continuity. However, operational security (OPSEC)…

Backdoor in Notepad++

Hackers associated with the Chinese government used a Trojaned version of Notepad++ to deliver malware to selected users. Notepad++ said that officials with the unnamed provider hosting the update infrastructure consulted with incident responders and found that it remained compromised…