Hadooken (Dropper) – Malware
The Hadooken malware is a sophisticated threat that has recently come to light, primarily targeting WebLogic servers running on Linux-based...
The Hadooken malware is a sophisticated threat that has recently come to light, primarily targeting WebLogic servers running on Linux-based...
In August 2024, researchers from Aqua Nautilus uncovered a novel Distributed Denial of Service (DDoS) campaign called Panamorfi. What...
STRRAT, a sophisticated Java-based Remote Access Trojan (RAT), has garnered attention due to its extensive capabilities and growing presenc...
Trojan Source is a novel type of malware that exploits subtleties in text encoding standards, particularly Unicode, to create source code...
A critical security vulnerability (CVE-2024-52046) has been identified in Apache MINA, a popular networking library widely used in Java...
The U.S. Department of State and the Secret Service have announced a substantial reward of $2.5 million for information leading to the arrest...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with other international organizations including the FBI...
Cuba ransomware, also known as Fidel, was first discovered in late 2019 and rose to prominence in 2022. Cuba’s impact doubled year...
Enterprise software giant SAP has released a set of critical security patches as part of its June 2024 Security Patch Day. These updates include...
Researchers have identified an attack involving a fake KMSPico activator tool, which is used to deliver Vidar Stealer malware. The attack...
© 2025 | CyberMaterial | All rights reserved