AWS Systems Manager Agent Used as Trojan
Cybersecurity researchers have unveiled a novel post-exploitation method operating within AWS, which transforms the AWS SSM Agent into a remote access trojan
Cybersecurity researchers have unveiled a novel post-exploitation method operating within AWS, which transforms the AWS SSM Agent into a remote access trojan
The threat actor known as Space Pirates has emerged as a major cybersecurity concern, having orchestrated attacks against 16 organizations in Russia and Serbia
Cybersecurity researchers have discovered a Python variant of NodeStealer, a potent stealer malware, capable of seizing control of Facebook business accounts
Activision, the renowned video game publisher, faced a significant setback as it was forced to take the servers of Call of Duty: Modern Warfare II offline
A sophisticated malware campaign has been detected by researchers, focusing on Italian organizations such as the tax agency, with the use of a downloader called WikiLoader
A recent cyber threat has emerged where threat actors create fake websites hosting trojanized software installers, deceiving unsuspecting users.
Researchers have issued a warning about two interconnected malware campaigns, CherryBlos and FakeTrade, targeting Android users for cryptocurrency
STARK#MULE has targeted Korean-speaking individuals using U.S. Military-themed document lures to trick them into running malware on compromised systems
Threat actors behind the IcedID malware, also known as BokBot, have recently updated the BackConnect module used for post-compromise activities
According to SonicWall's 2023 Mid-Year Cyber Threat Report, cybercriminals are increasingly shifting away from traditional ransomware attacks.
© 2024 | CyberMaterial | All rights reserved