Red Hat Data Breach Escalates Further

A hacking group known as the Crimson Collective recently made headlines after claiming to have stolen nearly 570 gigabytes of data from the enterprise The post Red Hat Data Breach Escalates Further first appeared on CyberMaterial. This article has been…

Steam And Microsoft Warn Of Unity Flaw

Unity is a popular cross-platform game engine used to develop a wide range of titles for computers, consoles, and mobile devices. Its versatility The post Steam And Microsoft Warn Of Unity Flaw first appeared on CyberMaterial. This article has been…

Rhadamanthys Stealer Evolves Again

First advertised by a threat actor named kingcrete2022, Rhadamanthys has become one of the most widely used information stealers available The post Rhadamanthys Stealer Evolves Again first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read the original…

XWorm 6.0 Returns With New Plugins

Since its emergence in 2022, XWorm, a powerful piece of malware developed by the threat actor EvilCoder, has evolved into a highly versatile and modular tool. The post XWorm 6.0 Returns With New Plugins first appeared on CyberMaterial. This article…

From Ransom to Revenue Loss

Discover how ransomware attacks go beyond ransom payments, impacting your company’s bottom line through recovery costs, lost revenue and damaged trust. The post From Ransom to Revenue Loss appeared first on Palo Alto Networks Blog. This article has been indexed…

Cavalry Werewolf APT Targets Russian Organizations Using FoalShell and Telegram C2

Cavalry Werewolf, a Russian-focused advanced persistent threat (APT) cluster, has intensified its offensive operations by experimenting with new malware variants and leveraging Telegram-based command-and-control (C2). Security teams must prioritize real-time visibility into the tools employed by this group to maintain…

Understanding Eye Vein Biometrics

Explore eye vein biometrics for authentication. Learn about its technology, security, development aspects, and how it compares to passwordless authentication methods. The post Understanding Eye Vein Biometrics appeared first on Security Boulevard. This article has been indexed from Security Boulevard…