EDR Bypass Exploited in Ransomware Attacks
A new "Bring Your Own Installer" technique has been discovered to bypass SentinelOne’s tamper protection. This vulnerability allows attackers to...
Read moreA new "Bring Your Own Installer" technique has been discovered to bypass SentinelOne’s tamper protection. This vulnerability allows attackers to...
Read moreCybersecurity researchers have uncovered three malicious Go modules with obfuscated code capable of fetching next-stage payloads.
Read moreA supply chain attack involving 21 backdoored Magento extensions has compromised between 500 and 1,000 e-commerce stores, including one belonging
Read moreIn 2025, a sophisticated malware called "Chimera" emerged, significantly advancing the cyber threat landscape. Chimera's first attack occurred in March...
Read moreThe "SonicBoom" attack chain targets enterprise appliances, including SonicWall Secure Mobile Access (SMA) and Commvault backup solutions.
Read moreIn 2025, a sophisticated malware called "Chimera" emerged, significantly advancing the cyber threat landscape. Chimera's first attack occurred in March...
Read moreCybercriminals have developed a sophisticated campaign using LummaStealer malware combined with deceptive CAPTCHA prompts to harvest sensitive data.
Read moreCyber criminals are impersonating trusted employee self-service websites to steal victims' personal and financial information, the FBI warns.
Read moreA sophisticated software supply chain attack used Python Package Index (PyPI) repositories to deploy malware. The campaign involved seven malicious
Read more© 2025 | CyberMaterial | All rights reserved