Oil-Themed Phishing Spreads Snake Keylogger
A sophisticated phishing campaign leveraging the Snake Keylogger malware has emerged, exploiting legitimate Java debugging utilities to bypass security.
A sophisticated phishing campaign leveraging the Snake Keylogger malware has emerged, exploiting legitimate Java debugging utilities to bypass security.
A sophisticated phishing campaign leveraging the Snake Keylogger malware has emerged, exploiting legitimate Java debugging utilities to bypass security.
Cybercriminals have launched a sophisticated campaign exploiting Facebook’s advertising platform to distribute their new malware. They aim to steal cryptocurrency wallet
The threat actor known as Blind Eagle has been linked with high confidence to the Russian bulletproof hosting service Proton66. Trustwave SpiderLabs made
Cybersecurity researchers have unveiled a new attack dubbed the “C4 Bomb” that bypasses Google Chrome’s AppBound Cookie Encryption.
Researchers have uncovered critical vulnerabilities affecting Bluetooth chipsets found in more than two dozen different audio products. These security issues
A new cyber campaign uses fake websites advertising popular software to deliver two very dangerous forms of malware. These malicious websites
A critical vulnerability has been disclosed in the popular Open VSX Registry by some cybersecurity research analysts. If successfully exploited,
A critical authentication vulnerability, which is now known by the name nOAuth abuse, has emerged as a severe threat. It specifically targets Microsoft Entra ID
A critical vulnerability impacts 689 printer models from Brother and also 53 other models from several other brands. The flaw allows a remote attacker
© 2025 | CyberMaterial | All rights reserved