Fake Websites Host Stealthy Fruity Trojan
A recent cyber threat has emerged where threat actors create fake websites hosting trojanized software installers, deceiving unsuspecting users.
A recent cyber threat has emerged where threat actors create fake websites hosting trojanized software installers, deceiving unsuspecting users.
Hackers have been actively exploiting the 'BleedingPipe' vulnerability in Minecraft mods, which allows them to execute malicious commands on both servers
The CISA has taken action against the growing cyber threat landscape by updating its Known Exploited Vulnerabilities Catalog with a new addition
The Russian nation-state actor, BlueBravo, has been engaging in cyber espionage against diplomatic entities in Eastern Europe, employing a new backdoor
Researchers have issued a warning about two interconnected malware campaigns, CherryBlos and FakeTrade, targeting Android users for cryptocurrency
STARK#MULE has targeted Korean-speaking individuals using U.S. Military-themed document lures to trick them into running malware on compromised systems
The Cybersecurity and Infrastructure Security Agency, along with the Australian Cyber Security Centre and the U.S. National Security Agency
The emergence of Linux encryptors targeting VMware's ESXi virtual machines has brought a new wave of ransomware attacks on enterprises.
Threat actors behind the IcedID malware, also known as BokBot, have recently updated the BackConnect module used for post-compromise activities
The UK's Ministry of Defence is launching an investigation after a typing error resulted in classified emails being mistakenly sent to Mali.
© 2024 | CyberMaterial | All rights reserved