HappyDoor (BackDoor ) – Malware
HappyDoor, a sophisticated malware developed by the Kimsuky group, has been a significant player in the threat landscape since its...
HappyDoor, a sophisticated malware developed by the Kimsuky group, has been a significant player in the threat landscape since its...
The North Korean hacking group Kimsuky has evolved its cyberattacks by employing malwareless phishing techniques that bypass endpoint...
North Korea-linked advanced persistent threat (APT) group Kimsuky has been implicated in a recent cyberattack on Diehl Defence, a German...
The Sparkling Pisces threat group, also known as Kimsuky, THALLIUM, and Velvet Chollima, has emerged as a significant player in the landscape...
Konni, a threat actor linked to the North Korean state-sponsored group Kimsuky, has significantly escalated its cyber espionage activities...
The North Korea-associated threat actor Kimsuky, also known as Black Banshee, Emerald Sleet, or Springtail, has been observed altering its strategies by...
The North Korean hacking group Kimsuky has been exploiting vulnerabilities in ScreenConnect to disseminate a new malware variant named ToddleShark.
Kimsuky has unleashed a novel Golang-based information stealer dubbed "Troll Stealer," suspected to be part of a targeted data theft campaign.
In recent cybersecurity developments, the North Korean threat actor known as ScarCruft has been identified deploying sophisticated ...
The North Korean state-sponsored hacker group known as Kimsuky (APT43) has been conducting spear-phishing campaigns by impersonating journalists.
© 2024 | CyberMaterial | All rights reserved