Hackers Host Amadey Malware via GitHub Repos
Cybersecurity researchers have uncovered a concerning trend where threat actors are leveraging legitimate public GitHub repositories
Read moreDetailsCybersecurity researchers have uncovered a concerning trend where threat actors are leveraging legitimate public GitHub repositories
Read moreDetailsThreat actors have begun to sophisticatedly weaponize Scalable Vector Graphics (SVG) files, transforming them into a new vector for malware...
Read moreDetailsA widespread malware campaign is using 607 malicious domains, often with typosquatting, to distribute fake Telegram APKs that enable
Read moreDetailsGoogle's Threat Intelligence Group (GTIG) has identified a sophisticated and ongoing cyberattack campaign, attributed to the financially motivated group
Read moreDetailsGoogle has swiftly released a crucial update for its Chrome web browser, addressing six security vulnerabilities, one of which, CVE-2025-6558
Read moreDetailsThe Interlock ransomware group, known for its financially motivated attacks and double extortion tactics, has enhanced its operational sophistication
Read moreDetailsZimperium zLabs researchers are closely tracking an evolving threat, noting its use of "evil-twin" tactics and duplicate package names to...
Read moreDetailsThe FBI, working with the Dutch FIOD, recently announced the seizure and dismantling of the infrastructure of multiple piracy websites.
Read moreDetailsThe "Contagious Interview" campaign, attributed to North Korean threat actors, has intensified with the release of 67 additional malicious packages...
Read moreDetails
© 2025 | CyberMaterial | All rights reserved