North Korean Hackers Target Job Seekers
North Korean hackers have recently intensified their cyber operations with a new campaign dubbed "Contagious Interview." Discovered...
North Korean hackers have recently intensified their cyber operations with a new campaign dubbed "Contagious Interview." Discovered...
On September 3, 2024, Google announced the release of two significant updates for Chrome 128, aimed at addressing a total of six high...
A new cyberattack campaign began on June 21, 2024, involving a sophisticated distribution of malicious software. The attack uses a JavaScript...
The JavaScript downloader malware SocGholish, also known as FakeUpdates, is being exploited to deploy AsyncRAT, a remote access...
First discovered in October 2023, LATRODECTUS is a backdoor written in C that communicates over HTTP using RC4 encrypted requests. The...
Hackers are increasingly using compiled V8 JavaScript to obfuscate their malicious code, making it difficult for traditional security measures...
Google has taken action to block ads for e-commerce sites using the Polyfill.io service. This move follows the acquisition of the domain by a Chinese...
Multiple WordPress plugins have been backdoored to inject malicious code that allows the creation of rogue administrator accounts. These...
Hackers are increasingly exploiting the Electron Framework’s cross-platform capabilities to develop advanced infostealer malware. The Electron...
A new command execution technique known as GrimResource has emerged, utilizing Microsoft Saved Console (MSC) files and an unpatched...
© 2025 | CyberMaterial | All rights reserved