HORUS Protector Used to Spread Malware
The HORUS Protector crypter has emerged as a significant threat in the cybersecurity landscape, being actively used to distribute multiple...
The HORUS Protector crypter has emerged as a significant threat in the cybersecurity landscape, being actively used to distribute multiple...
Threat actors have been increasingly exploiting Cloudflare’s TryCloudflare feature to deliver various remote access trojans (RATs), including...
A new variant of the Orcinius Trojan has been identified, utilizing a technique called VBA Stomping to obscure its infection. This multi-stage...
Cybersecurity researchers have uncovered a sophisticated attack where attackers cleverly embed Remcos malware within seemingly authentic...
HijackLoader, a modular malware loader first observed in 2023, has continued to evolve by incorporating sophisticated evasion and delivery...
The latest report from Ukraine's computer emergency response team, CERT-UA, has sounded the alarm on an alarming surge in attempts by malicious...
A groundbreaking study by the FortiGuard team exposes the intricacies of a sophisticated malware distribution strategy known as the "TicTacToe dropper.
The Remcos RAT, a notorious remote access trojan, has been identified utilizing a deceptive approach in South Korea, disguising itself as adult-themed games.
A hacking group known as UAC-0050, with a history of targeting Ukraine, has launched a fresh spying campaign, focusing on government agencies
Despite disruptions to its infrastructure, the threat actors associated with the QakBot malware have continued their activities through an ongoing phishing campaign
© 2024 | CyberMaterial | All rights reserved