Tag: EN

ESET Flags Rising Threat of AI-Driven Malware and Ransomware

The cybersecurity landscape entered a critical new era in the second half of 2025 as AI-powered malware transitioned from theoretical threat to tangible reality, while the ransomware-as-a-service economy expanded at an unprecedented pace. According to ESET Research’s latest Threat Report,…

NDSS 2025 – Distributed Function Secret Sharing And Applications

Session 7C: Secure Protocols Authors, Creators & Presenters: Pengzhi Xing (University of Electronic Science and Technology of China), Hongwei Li (University of Electronic Science and Technology of China), Meng Hao (Singapore Management University), Hanxiao Chen (University of Electronic Science and…

Azure Fundamentals Study Notes: Your Ultimate Guide to AZ-900

A beginner-friendly AZ-900 guide covering cloud concepts, Azure services, architecture, governance, monitoring, and exam prep for Azure Fundamentals certification. This article has been indexed from CyberMaterial Read the original article: Azure Fundamentals Study Notes: Your Ultimate Guide to AZ-900

Mustang Panda deploys ToneShell via signed kernel-mode rootkit driver

China-linked APT Mustang Panda used a signed kernel-mode rootkit driver to load shellcode and deploy its ToneShell backdoor. China-linked APT Mustang Panda (aka Hive0154, HoneyMyte, Camaro Dragon, RedDelta or Bronze President) was observed using a signed kernel-mode rootkit driver with embedded shellcode to deploy…

Interview QnA: Blockchain for Cybersecurity

A structured QnA guide explaining blockchain fundamentals, security features, smart contracts, risks, and real-world cybersecurity applications for interviews. This article has been indexed from CyberMaterial Read the original article: Interview QnA: Blockchain for Cybersecurity

SQL Study Notes Part I: Foundations of Structured Query Language

SQL fundamentals covering data retrieval, filtering, arithmetic, table creation, updates, deletes, NULL handling, and safe querying for beginners. This article has been indexed from CyberMaterial Read the original article: SQL Study Notes Part I: Foundations of Structured Query Language

Cyber Briefing: 2025.12.30

AI investment scams surge as Mac malware bypasses Gatekeeper, critical software flaws emerge, ransomware hits universities, and massive breaches expose millions. This article has been indexed from CyberMaterial Read the original article: Cyber Briefing: 2025.12.30