Tag: EN

Could ChatGPT Convince You to Buy Something?

Eighteen months ago, it was plausible that artificial intelligence might take a different path than social media. Back then, AI’s development hadn’t consolidated under a small number of big tech firms. Nor had it capitalized on consumer attention, surveilling users…

Resecurity Breach Claims Exposed as Honeypot Deception

  The hackers, who claimed to represent the “Scattered Lapsus$ Hunters” (SLH) group, believed they successfully compromised Resecurity, a cybersecurity firm based in the United States, by exfiltrating their data. Resecurity disputed this by saying they were only able to…

Generative AI for Cybersecurity and Privacy

An in-depth exploration of how generative AI is transforming cyber defense, privacy protection, and digital resilience. This article has been indexed from CyberMaterial Read the original article: Generative AI for Cybersecurity and Privacy

RedHunt-OS

A Linux based threat hunting and DFIR operating system built for blue team operations and adversary detection. This article has been indexed from CyberMaterial Read the original article: RedHunt-OS

Apache Airflow Flaws Expose Sensitive Workflow Data to Potential Attackers

Apache Airflow has patched two separate credential-exposure vulnerabilities in versions before 3.1.6.   The flaws could allow attackers to extract sensitive authentication data embedded in proxy configurations and templated workflow fields through log files and the web UI, potentially compromising network infrastructure and…

Gootloader Malware With Low Detection Rate Evades Most Security Tools

Gootloader malware has resurfaced, employing sophisticated evasion techniques to exploit malformed ZIP archives and obfuscation mechanisms to bypass security detection systems. The Gootloader malware campaign, tracked as a partnership between Storm-0494 and Vanilla Tempest, has returned in late 2025 with…

The Hidden Risk of Orphan Accounts

The Problem: The Identities Left Behind As organizations grow and evolve, employees, contractors, services, and systems come and go – but their accounts often remain. These abandoned or “orphan” accounts sit dormant across applications, platforms, assets, and cloud consoles. The…

Police Bust Thai Based Voice Phishing Ring

Authorities in Seoul recently dismantled a Thailand-based voice phishing organization responsible for stealing approximately 7 billion won from dozens of victims. This article has been indexed from CyberMaterial Read the original article: Police Bust Thai Based Voice Phishing Ring

Endace pushes packet capture into real-time security workflows

Endace has announced the release of OSm 7.3, a major software update that makes network packet data faster, more affordable, and more user-friendly. Faster search, API-driven automation, and instant forensics With threats evolving at unprecedented speed and regulations like DORA,…