BlackSuit: Striking Royal Similarities
The Linux variant of BlackSuit shares an "extremely high degree of similarity" with Royal, including 98% similarities in functions, 99.5% in blocks, and 98.9% in jumps.
The Linux variant of BlackSuit shares an "extremely high degree of similarity" with Royal, including 98% similarities in functions, 99.5% in blocks, and 98.9% in jumps.
This ongoing campaign aims to steal personally identifiable information (PII) and credit card details from users in North America, Latin America, and Europe.
The Chinese nation-state group Camaro Dragon is once again linked to a new backdoor malware, known as TinyNote, designed for intelligence-gathering purposes.
Google has taken down 32 malicious extensions from the Chrome Web Store, which had collectively amassed 75 million downloads.
The North Korean state-sponsored hacker group known as Kimsuky (APT43) has been conducting spear-phishing campaigns by impersonating journalists.
A recent analysis of the QBot malware, described as "evasive and tenacious," has uncovered key characteristics of its command-and-control (C2) infrastructure.
Cybersecurity researchers have analyzed the RokRAT remote access trojan used by the North Korean state-sponsored group ScarCruft.
In a recent move, CISA (Cybersecurity and Infrastructure Security Agency) has unleashed five highly informative Industrial Control Systems (ICS) advisories.
Hackers are actively exploiting a zero-day vulnerability in MOVEit, a popular file transfer tool used by numerous major companies.
Kaspersky, has reported that iPhones on its network were hacked using an iOS vulnerability that exploited iMessage zero-click attacks.
© 2025 | CyberMaterial | All rights reserved