ProfileHound: Post-Escalation Tool Designed to Achieve Red Team Objectives

ProfileHound emerges as a specialized post-exploitation instrument for offensive security professionals seeking to identify high-value targets within Active Directory environments. The tool addresses a critical gap in red-team reconnaissance by enumerating domain user profiles stored on compromised machines, enabling operators…

Attackers Leverage FortiWeb Vulnerabilities to Deploy Sliver C2 for Long-Term Access

Threat researchers have uncovered a sophisticated attack campaign targeting FortiWeb web application firewalls across multiple continents, with adversaries deploying the Sliver command-and-control framework to establish persistent access and establish covert proxy infrastructure. The discovery came from analyzing exposed Silver C2…

Cybersecurity Deals Exceed One Billion

The cybersecurity sector experienced a major shift in 2025 as consolidation reached record levels with over 420 merger and acquisition deals. This article has been indexed from CyberMaterial Read the original article: Cybersecurity Deals Exceed One Billion

Finland Arrests Crew Over Cable Damage

Finnish law enforcement took control of the cargo vessel Fitburg after discovering it had been dragging its anchor directly over a critical telecommunications link connecting Helsinki to Estonia. This article has been indexed from CyberMaterial Read the original article: Finland…

Cognizant Faces Lawsuits After Breach

Cognizant and its healthcare claims subsidiary, TriZetto Provider Solutions, are currently navigating a series of class-action lawsuits filed in federal courts across New Jersey and Missouri. This article has been indexed from CyberMaterial Read the original article: Cognizant Faces Lawsuits…

RondoDox Botnet Hijacks IoT Systems

Cybersecurity investigators have revealed a sophisticated nine-month campaign that has been actively compromising web applications and Internet of Things devices to build a massive botnet called RondoDox. This article has been indexed from CyberMaterial Read the original article: RondoDox Botnet…

Infostealers Hijack Business Infrastructure

A dangerous feedback loop in the cybercrime ecosystem is currently allowing attackers to leverage stolen credentials to take over trusted business websites. This article has been indexed from CyberMaterial Read the original article: Infostealers Hijack Business Infrastructure