Steganography Cloud C2 In Modular Chain
The Phantom Net Voxel campaign, attributed to the long-running threat actor APT28, or Fancy Bear, leveraged a sophisticated and stealthy approach
The Phantom Net Voxel campaign, attributed to the long-running threat actor APT28, or Fancy Bear, leveraged a sophisticated and stealthy approach
Cybersecurity analyst José A. Gómez Ledesma of the Quetzal Team identified a new phishing campaign targeting developers and influencers in the crypto industry.
Attackers are leveraging a clever SEO poisoning attack to target Chinese-speaking users, manipulating search results to trick them into downloading malware
In August 2025, Apple addressed a zero-day vulnerability, CVE-2025-43300, that was being actively exploited in its iOS, iPadOS, and macOS operating systems.
A recently identified social engineering campaign, dubbed FileFix, has been exploiting unsuspecting users by impersonating official Meta account suspension warnings.
A widespread ad fraud operation, nicknamed "SlopAds," has been stopped. The campaign was discovered by HUMAN's Satori Threat Intelligence team
EdisonWatch, an AI security firm, has identified a critical vulnerability in ChatGPT's new Model Context Protocol (MCP) tool support. This tool allows the AI
Microsoft has confirmed that its September 2025 security updates are causing significant connectivity issues for a wide array of Windows users.
A new wave of cyberattacks targeting the financial sector has been tied to the notorious hacking group known as Scattered Spider, raising serious doubts
Stay Ahead of Cyber Threats: Insights from Cybersecurity Expert Bob Chaput - Cybersecurity is no longer just a concern for IT departments—it’s a business
© 2025 | CyberMaterial | All rights reserved