GootLoader Malware Evolves With New Tactics
GootLoader malware remains actively used by threat actors to deliver various payloads to compromised systems. Recent updates have...
GootLoader malware remains actively used by threat actors to deliver various payloads to compromised systems. Recent updates have...
Hackers are increasingly imitating penetration testing services to mask their malicious activities as legitimate security assessments. By posing...
North Korean hackers, identified as the Kimsuky group, continue to utilize the 'HappyDoor' malware in sophisticated email-based attacks...
WordPress has released version 6.5.5, a critical security update aimed at addressing significant vulnerabilities that could compromise the security...
Hackers are constantly seeking new methods to bypass the ethical and safety measures built into AI systems, allowing them to exploit these systems...
Researchers at K7 Labs have discovered a significant cybersecurity threat aimed at Telegram users, identified as SpyMax. This sophisticated Remote...
Promon's latest research highlights Snowblind, a sophisticated malware targeting banking apps across Southeast Asia. This novel threat...
On June 27, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) issued seven advisories concerning Industrial Control Systems...
Passkey technology is increasingly used to protect online accounts, but many accounts in banking, e-commerce, social media, and...
Unknown threat actors have exploited a now-patched security flaw in Microsoft MSHTML to deliver a surveillance tool called MerkSpy...
© 2024 | CyberMaterial | All rights reserved