Necro (Trojans) – Malware
The Necro Trojan has become a persistent and evolving threat to Android users, consistently infiltrating popular applications and modded...
Read moreDetailsThe Necro Trojan has become a persistent and evolving threat to Android users, consistently infiltrating popular applications and modded...
Read moreDetailsA recently uncovered cryptojacking campaign has raised alarm bells within the cybersecurity community, as it exploits vulnerabilities in Docker and...
Read moreDetailsIn the ever-evolving landscape of open-source software, security threats continue to grow in sophistication, targeting both developers...
Read moreDetailsAngelX is a newly discovered variant of the notorious Angel Drainer malware, which has been designed to exploit vulnerabilities in...
Read moreDetailsWhisperGate ransomware, first identified in January 2022, represents a sophisticated and destructive form of cyberattack, specifically targeting...
Read moreDetailsCXCLNT is a sophisticated malware tool that has been observed in recent cyberattacks, notably within the operations of advanced persistent...
Read moreDetailsCLNTEND is a recently discovered remote access tool (RAT) that has been observed in targeted cyberattacks against military and industrial...
Read moreDetailsIn the ever-evolving world of cyber threats, mobile devices are increasingly becoming prime targets for malicious actors. One of the...
Read moreDetailsAs organizations continue to strengthen their cybersecurity measures, air-gapped systems—isolated networks that are disconnected...
Read moreDetails© 2025 | CyberMaterial | All rights reserved