Malicious Extensions Allow Device Hijacking
SquareX recently revealed an alarming attack technique involving browser extensions that can take over a device with minimal user interaction.
SquareX recently revealed an alarming attack technique involving browser extensions that can take over a device with minimal user interaction.
The implications of the "Time Bandit" vulnerability are significant, as it could enable large-scale malicious operations.
A new wave of cyberattacks has emerged, utilizing the Coyote Banking Trojan to target financial institutions across Brazil.
Brute Ratel C4 (BRC4), also known by its aliases BOLDBADGER and BruteRatel, is a commercial framework that has gained traction in...
In the rapidly changing world of cybersecurity, malware continues to evolve, adopting increasingly sophisticated techniques to...
The ACR Stealer is a potent piece of malware that has rapidly gained notoriety in the cybersecurity realm due to its ability to harvest sensitive...
The emergence of sophisticated malware threats continues to challenge cybersecurity professionals, with the recent discovery of HotPage malware...
A new variant of the Mirai-based Aquabot botnet, known as Aquabotv3, has been actively exploiting a command injection vulnerability in Mitel SIP phones.
Cybersecurity experts have discovered a new exploit leveraging the Remote Desktop Protocol (RDP), a widely used tool for remote access to Windows systems.
Cybersecurity experts are sounding the alarm over a new SMS-based phishing tool called Devil-Traff, which is being used to carry out large-scale cyberattacks across the globe.
© 2025 | CyberMaterial | All rights reserved