FlyingYeti (UAC-0149) – Threat Actor
FlyingYeti, also recognized as UAC-0149, is a sophisticated cyber espionage group that emerged around 2016. Known for its targeted operations...
FlyingYeti, also recognized as UAC-0149, is a sophisticated cyber espionage group that emerged around 2016. Known for its targeted operations...
Microsoft has issued urgent alerts to its customers following a significant data breach by Russian state hackers, which compromised the...
TeamViewer, a provider of remote connectivity software, has identified a compromise within its corporate network, allegedly perpetrated by...
Security analysts from Mandiant have issued a concerning alert following their discovery of Russia's APT29 hacking group targeting political parties in Germany.
Cybersecurity and intelligence agencies have issued an advisory concerning the security of Ubiquiti EdgeRouter users in the dismantling of the MooBot botnet
CISA with the UK's NCSC and other partners, has released a joint advisory about recent tactics used by Russian SVR cyber actors to infiltrate cloud environments
HPE is the latest victim of suspected Kremlin-linked hackers from the APT29 group, who infiltrated the company's cloud email environment.
The attack, attributed to the Russian APT group Midnight Blizzard, employed a password spray attack to compromise a non-production test tenant account.
Russian threat actor APT28, also known as ITG05, has been identified in an ongoing cyber espionage campaign targeting entities in at least 13 nations.
Russian state-sponsored hackers, identified as APT29 or Cozy Bear, have carried out a cyber-espionage campaign targeting embassies
© 2025 | CyberMaterial | All rights reserved