Bing Ad Exploitation by Hackers
Hackers have recently exploited Microsoft Bing's advertising platform to orchestrate a sophisticated malvertising campaign targeting users searching...
Hackers have recently exploited Microsoft Bing's advertising platform to orchestrate a sophisticated malvertising campaign targeting users searching...
Azorult malware operates as an information-stealing threat, collecting data such as browsing history, cookies, login credentials, and cryptocurrency details.
A recently identified phishing campaign, known as Operation PhantomBlu, has emerged as a significant threat to U.S. organizations.
A recent phishing campaign has been detected distributing remote access trojans (RATs), including VCURMS and STRRAT, through a malicious Java-based downloader.
A financially driven threat actor, identified as Magnet Goblin, is incorporating one-day security vulnerabilities into its arsenal to breach edge devices.
Zscaler’s ThreatLabz uncovered a disturbing trend: a threat actor deploying fake Skype, Google Meet, and Zoom websites to disseminate malware.
Bitfrost collects the victim's hostname, IP address, and process IDs, then uses RC4 encryption to secure it before transmission to the C2.
The emergence of a new variant of the Bifrost remote access trojan targeting Linux systems has been identified by researchers from Palo Alto Networks' Unit 42.
As travelers gear up for a new season of adventures, cyber attackers are shifting their focus to exploit this trend by distributing the Agent Tesla malware.
CISA has recently released a critical Industrial Control Systems (ICS) advisory, focusing on a vulnerability (CVE-2023-6815) in Mitsubishi Electric's MELSEC
© 2024 | CyberMaterial | All rights reserved