Chimera Malware Outsmarts Firewalls
In 2025, a sophisticated malware called "Chimera" emerged, significantly advancing the cyber threat landscape. Chimera's first attack occurred in March...
Read moreDetailsIn 2025, a sophisticated malware called "Chimera" emerged, significantly advancing the cyber threat landscape. Chimera's first attack occurred in March...
Read moreDetailsA critical security vulnerability in macOS has been discovered, allowing malicious actors to bypass the App Sandbox protection. Tracked as...
Read moreDetailsCybercriminals have developed a sophisticated campaign using LummaStealer malware combined with deceptive CAPTCHA prompts to harvest sensitive data.
Read moreDetailsMintsLoader is a malware loader used to deliver GhostWeaver, a PowerShell-based remote access trojan. The infection process involves multiple stages
Read moreDetailsCyber criminals are impersonating trusted employee self-service websites to steal victims' personal and financial information, the FBI warns.
Read moreDetailsA sophisticated software supply chain attack used Python Package Index (PyPI) repositories to deploy malware. The campaign involved seven malicious
Read moreDetailsTheWizards, a China-linked APT group, uses a tool called Spellbinder to enable adversary-in-the-middle attacks within networks. Spellbinder exploits IPv6 SLAAC
Read moreDetailsA new malware campaign is targeting WordPress websites using a disguised malicious plugin that mimics a security tool. This plugin
Read moreDetailsThe Nitrogen ransomware campaign has been using deceptive malvertising techniques to target organizations. One method involved fake software downloads
Read moreDetails
© 2025 | CyberMaterial | All rights reserved