LummaC2 Trig Defense and Cyber Threats
LummaC2, a stealer malware, has undergone significant updates, including a novel anti-sandbox technique based on trigonometry.
LummaC2, a stealer malware, has undergone significant updates, including a novel anti-sandbox technique based on trigonometry.
An undisclosed threat actor has deployed a prolonged campaign publishing typosquat packages on the Python Package Index (PyPI).
Threat actors are exploiting manipulated search results and deceptive Google ads to lure users seeking legitimate software.
A hacking group known as UAC-0050, with a history of targeting Ukraine, has launched a fresh spying campaign, focusing on government agencies
The U.S. CISA has identified three actively exploited security flaws, adding them to its Known Exploited Vulnerabilities (KEV) catalog
The U.S. FCC is implementing stringent rules to safeguard consumers against the rising threat of SIM-swapping attacks and port-out fraud
U.S. cybersecurity and intelligence agencies have issued a joint advisory highlighting the activities of the cybercriminal group known as Scattered Spider
A malware botnet known as 'Ddostf' has been identified targeting MySQL servers, repurposing them into a DDoS-as-a-Service platform
A recent report from Bitdefender reveals a series of novel attack methods that expose vulnerabilities in Google Workspace
Zimbra Collaboration email software fell victim to real-world attacks orchestrated by four distinct hacker groups exploiting a zero-day flaw
© 2025 | CyberMaterial | All rights reserved