QBot Malware: Evasive & Dynamic C2
A recent analysis of the QBot malware, described as "evasive and tenacious," has uncovered key characteristics of its command-and-control (C2)...
Read moreA recent analysis of the QBot malware, described as "evasive and tenacious," has uncovered key characteristics of its command-and-control (C2)...
Read moreCybersecurity researchers have analyzed the RokRAT remote access trojan used by the North Korean state-sponsored group ScarCruft.
Read moreIn a recent move, CISA (Cybersecurity and Infrastructure Security Agency) has unleashed five highly informative Industrial Control Systems (ICS) advisories.
Read moreHackers are actively exploiting a zero-day vulnerability in MOVEit, a popular file transfer tool used by numerous major companies.
Read moreKaspersky, has reported that iPhones on its network were hacked using an iOS vulnerability that exploited iMessage zero-click attacks.
Read moreA cyber campaign called Horabot has been discovered by Cisco Talos, targeting Spanish-speaking users in Latin America since November 2020.
Read moreResearchers from firmware security firm Eclypsium have discovered a potential backdoor-like behavior in Gigabyte systems, which exposes devices to compromise.
Read moreSpyboy is advertising a tool called "Terminator" on a Russian-speaking hacking forum, claiming it can terminate any antivirus, XDR, and...
Read moreA stealthy remote access trojan (RAT) known as 'SeroXen' has gained popularity among cybercriminals due to its low detection rates...
Read more© 2024 | CyberMaterial | All rights reserved