PyPI Attack Uses Gmail to Exfiltrate Data
A sophisticated software supply chain attack used Python Package Index (PyPI) repositories to deploy malware. The campaign involved seven malicious
A sophisticated software supply chain attack used Python Package Index (PyPI) repositories to deploy malware. The campaign involved seven malicious
MintsLoader is a malware loader used to deliver GhostWeaver, a PowerShell-based remote access trojan. The infection process involves multiple stages
Cybercriminals have developed a sophisticated campaign using LummaStealer malware combined with deceptive CAPTCHA prompts to harvest sensitive data.
A new malware campaign is targeting WordPress websites using a disguised malicious plugin that mimics a security tool. This plugin
TheWizards, a China-linked APT group, uses a tool called Spellbinder to enable adversary-in-the-middle attacks within networks. Spellbinder exploits IPv6 SLAAC
The Nitrogen ransomware campaign has been using deceptive malvertising techniques to target organizations. One method involved fake software downloads
The Nitrogen ransomware campaign has been using deceptive malvertising techniques to target organizations. One method involved fake software downloads
SonicWall has recently issued a warning about several vulnerabilities impacting its Secure Mobile Access (SMA) appliances. These vulnerabilities, identified
Ascension Health reported a data breach involving over 100,000 individuals after hackers exploited a third-party software flaw. The nonprofit healthcare provider
U.K. retailer The Co-operative Group reported an attempted cyberattack and shut down several IT systems in response. The company took proactive
© 2025 | CyberMaterial | All rights reserved