Attackers Hide Malware in WordPress mu-Plugins
Threat actors are increasingly exploiting the "mu-plugins" directory in WordPress to conceal malicious code and maintain persistent access. These must-use
Threat actors are increasingly exploiting the "mu-plugins" directory in WordPress to conceal malicious code and maintain persistent access. These must-use
The Konni RAT (Remote Access Trojan) has evolved significantly, leveraging a sophisticated Windows Explorer exploitation technique.
Earth Alux, a China-linked advanced persistent threat (APT) group, has disrupted the cybersecurity landscape since 2023. Initially focusing on Asia-Pacific
Triton Uses Telegram, a RAT with advanced Python-based malware that uses Telegram for command and control, making detection harder
A newly discovered Android Trojan named Crocodilus has been found targeting users primarily in Spain and Turkey. The malware operates
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified a new malware variant called RESURGE, which exploits the CVE-2025-0282
Three security bypasses were discovered in Ubuntu Linux’s user namespace restrictions, potentially allowing local attackers to gain administrative privileges.
Cisco Talos has revealed an ongoing cyber campaign by the Gamaredon group, targeting Ukrainian users with malicious LNK files. These files
A new Python-based Remote Access Trojan (RAT) has raised concerns within the cybersecurity community. It uses Discord’s API as a Command and Control (C2)
Mozilla has released urgent updates to address a critical security flaw in its Firefox browser for Windows. The vulnerability, CVE-2025-2857, was identified
© 2025 | CyberMaterial | All rights reserved