FakeBat Malvertising Active Campaigns
The threat actor behind FakeBat employs MSIX installers containing heavily obfuscated PowerShell code, utilizing various tactics to evade detection.
The threat actor behind FakeBat employs MSIX installers containing heavily obfuscated PowerShell code, utilizing various tactics to evade detection.
The PixPirate Android banking trojan employs a new technique to conceal its presence on compromised devices, enabling threat actors to harvest information
HiddenLayer exposes vulnerabilities in Google's Gemini large language model (LLM), revealing potential risks of system prompt leaks, harmful content generation
A recent development in cyber threat landscape has unveiled the emergence of TMChecker, a remote access tool discovered on the Dark Web...
A critical security vulnerability, identified as CVE-2024-21334, has been discovered in the Open Management Infrastructure (OMI), with the...
A new malicious campaign has emerged, bearing the name "Tweaks Stealer", with its primary target being the extensive user base of the popular...
The cybersecurity landscape has been confronted with a new security threat in the form of KrustyLoader, a malicious Rust-based backdoor exposing...
Recent security observations by Cisco Talos Incident Response have revealed an alarming trend of threat actors exploiting legitimate digital...
Mitel's security advisory highlighted an Improper Configuration vulnerability in the BluStar component of Mitel InAttend and Mitel CMG products.
On March 12, 2024, CISA released an advisory concerning Industrial Control Systems (ICS), specifically targeting Schneider Electric's EcoStruxure Power Design.
© 2024 | CyberMaterial | All rights reserved