PyPI Attack Uses Gmail to Exfiltrate Data
A sophisticated software supply chain attack used Python Package Index (PyPI) repositories to deploy malware. The campaign involved seven malicious
A sophisticated software supply chain attack used Python Package Index (PyPI) repositories to deploy malware. The campaign involved seven malicious
MintsLoader is a malware loader used to deliver GhostWeaver, a PowerShell-based remote access trojan. The infection process involves multiple stages
Cybercriminals have developed a sophisticated campaign using LummaStealer malware combined with deceptive CAPTCHA prompts to harvest sensitive data.
A new malware campaign is targeting WordPress websites using a disguised malicious plugin that mimics a security tool. This plugin
TheWizards, a China-linked APT group, uses a tool called Spellbinder to enable adversary-in-the-middle attacks within networks. Spellbinder exploits IPv6 SLAAC
The Nitrogen ransomware campaign has been using deceptive malvertising techniques to target organizations. One method involved fake software downloads
The Nitrogen ransomware campaign has been using deceptive malvertising techniques to target organizations. One method involved fake software downloads
SonicWall has recently issued a warning about several vulnerabilities impacting its Secure Mobile Access (SMA) appliances. These vulnerabilities, identified
Researchers at Oligo Security uncovered major flaws in Apple’s AirPlay protocol and SDK affecting many Apple and third-party devices.
Security researchers uncovered major flaws in default IAM roles used by AWS services like SageMaker, Glue, EMR, and Ray. These roles often grant excessive
© 2025 | CyberMaterial | All rights reserved