InnoSetup Malware Posing as MS Office Crack
A new malware strain disguised as software cracks and commercial tools uses a just-in-time generation tactic to create unique variants for...
A new malware strain disguised as software cracks and commercial tools uses a just-in-time generation tactic to create unique variants for...
A new command execution technique known as GrimResource has emerged, utilizing Microsoft Saved Console (MSC) files and an unpatched...
Group-IB has uncovered the activities of the threat actor known as Boolka, revealing their sophisticated malware operations and web...
A new vulnerability, identified as CVE-2024-29973, has been discovered in Zyxel NAS devices, making them vulnerable to attacks from...
The newly discovered vulnerability CVE-2024-0762, known as "UEFIcanhazbufferoverflow," affects the Phoenix SecureCore UEFI firmware...
Hackers frequently exploit DNS and ICMP tunneling to covertly transmit data and bypass network security measures. These protocols, often...
UNC3886, identified as a suspected Chinese threat actor, employs sophisticated tactics involving open-source rootkits like 'Reptile' and...
ANSSI, France's information security agency, has attributed targeted cyber attacks against French diplomatic entities to state-sponsored actors...
Symantec's recent report details a long-running espionage campaign targeting telecommunications companies in an unspecified Asian...
On June 20, 2024, CISA released three important advisories regarding vulnerabilities in Industrial Control Systems (ICS). These advisories...
© 2024 | CyberMaterial | All rights reserved