Gelsemium APT Targets Linux with WolfsBane
The Chinese advanced persistent threat (APT) group Gelsemium has expanded its arsenal by deploying WolfsBane, a Linux-based backdoor...
The Chinese advanced persistent threat (APT) group Gelsemium has expanded its arsenal by deploying WolfsBane, a Linux-based backdoor...
APT37, a state-sponsored cyber threat group believed to be backed by North Korea, has been actively conducting sophisticated reconnaissance...
The Crimson Palace cyberespionage campaign, attributed to a Chinese state-directed threat actor, has significantly ramped up its...
This group's objective is to conduct disinformation campaigns aimed at undermining NATO's credibility, primarily targeting Russian, Ukrainian, and Poland...
Belarusian state-sponsored hackers, identified as Ghostwriter, have initiated a fresh cyberespionage campaign aimed at Ukraine's...
ESET has uncovered a sophisticated cyber campaign orchestrated by the China-linked threat actor, Evasive Panda, targeting Tibetan users since September 2023.
Threat actor ScarCruft, also known as APT37, has launched a new cyber espionage campaign targeting media organizations and experts in North Korean affairs.
Microsoft has issued a warning about a group of Iranian-backed state hackers affiliated with the APT35 Iranian cyberespionage group.
Several state and industrial organizations in Russia fell victim to a custom Go-based backdoor designed for data theft, likely furthering espionage efforts
Chinese state-run hackers have launched an extensive cyberespionage campaign, compromising hundreds of organizations by exploiting a zero-day vulnerability.
© 2024 | CyberMaterial | All rights reserved