Chimera Malware Outsmarts Firewalls
In 2025, a sophisticated malware called "Chimera" emerged, significantly advancing the cyber threat landscape. Chimera's first attack occurred in March 2025
In 2025, a sophisticated malware called "Chimera" emerged, significantly advancing the cyber threat landscape. Chimera's first attack occurred in March 2025
In 2025, a sophisticated malware called "Chimera" emerged, significantly advancing the cyber threat landscape. Chimera's first attack occurred in March 2025
Cyber criminals are impersonating trusted employee self-service websites to steal victims' personal and financial information, the FBI warns.
A critical security vulnerability in macOS has been discovered, allowing malicious actors to bypass the App Sandbox protection. Tracked as CVE-2025-31191
A sophisticated software supply chain attack used Python Package Index (PyPI) repositories to deploy malware. The campaign involved seven malicious
MintsLoader is a malware loader used to deliver GhostWeaver, a PowerShell-based remote access trojan. The infection process involves multiple stages
Cybercriminals have developed a sophisticated campaign using LummaStealer malware combined with deceptive CAPTCHA prompts to harvest sensitive data.
A new malware campaign is targeting WordPress websites using a disguised malicious plugin that mimics a security tool. This plugin
TheWizards, a China-linked APT group, uses a tool called Spellbinder to enable adversary-in-the-middle attacks within networks. Spellbinder exploits IPv6 SLAAC
The Nitrogen ransomware campaign has been using deceptive malvertising techniques to target organizations. One method involved fake software downloads
© 2025 | CyberMaterial | All rights reserved