LummaStealer Malware Uses FakeCAPTCHA Trick
Cybercriminals have developed a sophisticated campaign using LummaStealer malware combined with deceptive CAPTCHA prompts to harvest sensitive data.
Cybercriminals have developed a sophisticated campaign using LummaStealer malware combined with deceptive CAPTCHA prompts to harvest sensitive data.
A new malware campaign is targeting WordPress websites using a disguised malicious plugin that mimics a security tool. This plugin
TheWizards, a China-linked APT group, uses a tool called Spellbinder to enable adversary-in-the-middle attacks within networks. Spellbinder exploits IPv6 SLAAC
The Nitrogen ransomware campaign has been using deceptive malvertising techniques to target organizations. One method involved fake software downloads
The Nitrogen ransomware campaign has been using deceptive malvertising techniques to target organizations. One method involved fake software downloads
SonicWall has recently issued a warning about several vulnerabilities impacting its Secure Mobile Access (SMA) appliances. These vulnerabilities, identified
Researchers at Oligo Security uncovered major flaws in Apple’s AirPlay protocol and SDK affecting many Apple and third-party devices.
Security researchers uncovered major flaws in default IAM roles used by AWS services like SageMaker, Glue, EMR, and Ray. These roles often grant excessive
Gremlin Stealer, a new infostealer variant, has emerged, gaining attention for its advanced capabilities. According to Palo Alto Networks' Unit 42
A recently discovered vulnerability in Docker Desktop for macOS is raising alarms within the security community. The flaw, identified as CVE-2025-4095, results from
© 2025 | CyberMaterial | All rights reserved