Amadey Loader (Dropper) – Malware
In recent months, a sophisticated attack vector has emerged, utilizing social engineering to exploit PowerShell for delivering malware...
In recent months, a sophisticated attack vector has emerged, utilizing social engineering to exploit PowerShell for delivering malware...
A new phishing campaign is exploiting the Windows search protocol (search-ms URI) to deliver malware via HTML attachments. These attachments...
Progressive Web Apps (PWAs) represent a significant advancement in web technology, merging the functionality of traditional web...
Phishing attackers are exploiting social engineering tactics to distribute malicious HTML attachments via email. These attachments, disguised...
A critical vulnerability has been discovered in a Python package widely used by AI application developers, posing a significant risk to systems and...
Hackers leverage the trustworthiness of widely used file formats like XLSX, HTML, and PDF to disseminate malware via phishing emails. Forcepoint...
Hackers are increasingly exploiting the Electron Framework, a popular cross-platform development tool used to create desktop applications using web...
A critical vulnerability has been discovered in the WordPress theme named "Responsive," identified as CVE-2024-2848. This flaw allows attackers to inject...
A recent study by cybersecurity firm KomodoSec has shed light on critical vulnerabilities present in the HTML to PDF export functionalities of web...
A recent phishing campaign has honed in on the Latin American region, aiming to infiltrate Windows systems with malicious payloads.
© 2024 | CyberMaterial | All rights reserved