Hijack Loader Malware New Evasion Tactics
Cybersecurity researchers have uncovered an updated version of Hijack Loader, a malware loader with new features for evading detection.
Cybersecurity researchers have uncovered an updated version of Hijack Loader, a malware loader with new features for evading detection.
A new fileless cryptocurrency mining campaign has targeted over 1,500 exposed PostgreSQL servers. The campaign, attributed to the JINX-0126
Apple has issued an urgent security advisory regarding three critical zero-day vulnerabilities, which have been actively exploited in sophisticated attacks.
Threat actors are increasingly exploiting the "mu-plugins" directory in WordPress to conceal malicious code and maintain persistent access. These must-use
The Konni RAT (Remote Access Trojan) has evolved significantly, leveraging a sophisticated Windows Explorer exploitation technique.
Earth Alux, a China-linked advanced persistent threat (APT) group, has disrupted the cybersecurity landscape since 2023. Initially focusing on Asia-Pacific
Triton Uses Telegram, a RAT with advanced Python-based malware that uses Telegram for command and control, making detection harder
A newly discovered Android Trojan named Crocodilus has been found targeting users primarily in Spain and Turkey. The malware operates
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified a new malware variant called RESURGE, which exploits the CVE-2025-0282
Three security bypasses were discovered in Ubuntu Linux’s user namespace restrictions, potentially allowing local attackers to gain administrative privileges.
© 2025 | CyberMaterial | All rights reserved