ClearFake Increases Web3 Exploitation
The ClearFake campaign has evolved significantly, particularly with its adoption of new tactics and technologies. As of May 2024, the attackers introduced
The ClearFake campaign has evolved significantly, particularly with its adoption of new tactics and technologies. As of May 2024, the attackers introduced
A widespread ad fraud campaign has been uncovered, involving hundreds of malicious apps on Google Play. These apps, which appeared as legitimate
Cybersecurity researchers have uncovered a dangerous attack vector called the "Rules File Backdoor" targeting AI-powered code editors.
A new sophisticated cyberattack method has emerged, using DLL side-loading to distribute malicious Python code. This method exploits the DLL
MirrorFace, a China-aligned threat actor, has expanded its operations, targeting a Central European diplomatic institution. Their attack, called Operation AkaiRyū,
CVE-2024-54085 is a critical vulnerability in AMI's MegaRAC Baseboard Management Controller (BMC) software. The flaw allows attackers to bypass authentication
Cybersecurity researchers have identified a supply chain attack targeting the tj-actions/changed-files GitHub Action, widely used in over 23,000 repositories
Microsoft recently uncovered StilachiRAT, a highly sophisticated remote access trojan (RAT) designed to evade detection and maintain persistence within
A recently disclosed security flaw in Apache Tomcat, tracked as CVE-2025-24813, is already being actively exploited in the wild.
The FBI has issued an urgent warning about a growing cybersecurity threat involving malicious file conversion tools. These tools, which are typically
© 2025 | CyberMaterial | All rights reserved