Government Entities Targeted by PureCrypter
Menlo Labs has uncovered a new threat actor that has been targeting government entities via a Discord-distributed threat campaign.
Menlo Labs has uncovered a new threat actor that has been targeting government entities via a Discord-distributed threat campaign.
The malware, named S1deload Stealer, is a DLL side-loading threat that bypasses security defenses to execute malicious components.
Pepsi Bottling Ventures LLC suffered a data breach caused by a network intrusion that resulted in the installation of information-stealing ...
TrendMicro recently found an active campaign that uses a fake employment pretext targeting Eastern Europeans in the cryptocurrency industry to ...
The Graphiron malware allows operators to harvest a wide range of information from the infected systems, including system info, credentials, ...
An ongoing malvertising campaign is being used to distribute virtualized .NET loaders that are designed to deploy the FormBook information-stealing ...
Ukrainian and Polish cyber defenders are warning against a slew of phishing websites that mimic official sites, in particular a ...
A new Android banking trojan has set its eyes on Brazilian financial institutions to commit fraud by leveraging the PIX ...
A threat actor named InTheBox is promoting on Russian cybercrime forums an inventory of 1,894 web injects (overlays of phishing windows) for stealing ...
The actual minting process didn't stop until January 25 at 6 AM UTC-5, giving scammers plenty of chance to leverage ...
Security through data
© 2023 | CyberMaterial | All rights reserved.
World’s #1 Cybersecurity Repository
© 2022 Cybermaterial - Security Through Data .