EDR Bypass Exploited in Ransomware Attacks
A new "Bring Your Own Installer" technique has been discovered to bypass SentinelOne’s tamper protection. This vulnerability allows attackers to disable
A new "Bring Your Own Installer" technique has been discovered to bypass SentinelOne’s tamper protection. This vulnerability allows attackers to disable
Cybersecurity researchers have uncovered three malicious Go modules with obfuscated code capable of fetching next-stage payloads.
A supply chain attack involving 21 backdoored Magento extensions has compromised between 500 and 1,000 e-commerce stores, including one belonging
The "SonicBoom" attack chain targets enterprise appliances, including SonicWall Secure Mobile Access (SMA) and Commvault backup solutions.
In 2025, a sophisticated malware called "Chimera" emerged, significantly advancing the cyber threat landscape. Chimera's first attack occurred in March 2025
In 2025, a sophisticated malware called "Chimera" emerged, significantly advancing the cyber threat landscape. Chimera's first attack occurred in March 2025
Cyber criminals are impersonating trusted employee self-service websites to steal victims' personal and financial information, the FBI warns.
A critical security vulnerability in macOS has been discovered, allowing malicious actors to bypass the App Sandbox protection. Tracked as CVE-2025-31191
A sophisticated software supply chain attack used Python Package Index (PyPI) repositories to deploy malware. The campaign involved seven malicious
MintsLoader is a malware loader used to deliver GhostWeaver, a PowerShell-based remote access trojan. The infection process involves multiple stages
© 2025 | CyberMaterial | All rights reserved