North Korean Group Targets US Infrastructure
The FBI, NSA, and CISA have issued a critical warning about the North Korean cyber-espionage group Andariel, which is ramping up its...
Read moreThe FBI, NSA, and CISA have issued a critical warning about the North Korean cyber-espionage group Andariel, which is ramping up its...
Read moreBMW Concessionaires Hong Kong has confirmed a serious data breach affecting approximately 14,000 customers. The incident, revealed on...
Read moreOn July 26, 2024, the U.S. Department of Justice (DoJ) unsealed an indictment against Rim Jong Hyok, a North Korean military intelligence...
Read more
Passwords are the primary method of authentication for most online accounts, including email, social media, banking, and shopping accounts.
Read moreHow to protect your online privacy? Use a different password for every account, and make sure that each password is long and complex.
Read moreToddyCat, an APT group, primarily targets governmental organizations, including defense-related entities, across the Asia-Pacific region. The group...
APT44, also known as Sandworm, FROZENBARENTS, and Seashell Blizzard, is a threat group backed by the Russian Federation and linked...
Earth Freybug is a cyberthreat group that has been active since at least 2012 that focuses on espionage and financially...
Cuba ransomware was first observed in December 2019 but only gained notoriety in November 2021 when the FBI posted an...
Muddling Meerkat is a newly identified cluster, believed to be a People’s Republic of China (PRC) nation-state actor. This group...
UNC5537 has only recently been formally identified and tracked by Mandiant, thus appearing solely in Mandiant’s taxonomy for the time...
Also known as vulnerability assessment, a vulnerability analysis is a systematic examination of an information system or product to determine the adequacy of security...
Stealth viruses are a type of computer virus that actively attempts to hide its presence and activities on an infected...
Web skimming attacks, also known as formjacking, occur when malicious script is injected into sites to steal information entered into...
BIFROSE malware are backdoors that often arrive on systems either downloaded by users when visiting malicious sites or downloaded by...
Bitfrost collects the victim's hostname, IP address, and process IDs, then uses RC4 encryption to secure it before transmission to...
It is a computer worm that infected over ten million Windows personal computers. It started spreading as an email message...
© 2024 | CyberMaterial | All rights reserved