New Crimson Kingsnake gang impersonates law firms in BEC attacks
The threat actors impersonate lawyers who are sending invoices for overdue payment of services supposedly provided to the recipient firm ...
The threat actors impersonate lawyers who are sending invoices for overdue payment of services supposedly provided to the recipient firm ...
The unknown threat actor has also been observed leveraging trojanized variants of Advanced IP Scanner and pdfFiller as droppers to ...
Researchers have identified over two dozen Python packages on the PyPI registry that imitate popular libraries but instead drop info-stealers.
India’s mass rapid transit systems rely on commuter smart cards that are vulnerable to exploitation and allow anyone to effectively travel ...
The group added the name of the company to its Tor leak site and is threatening to publish alleged stolen ...
File hosting service Dropbox announced that threat actors gained unauthorized access to 130 of its source code repositories on GitHub.
Researchers have warned of enterprise software misconfigurations leading to the leak of sensitive records on urlscan.io.
The problem with making it easy for bad actors to access a partial SSN is that those four digits provide ...
Threat actors are using the compromised infrastructure of an undisclosed media company to deploy the SocGholish JavaScript malware framework.
TikTok claims to have in place security controls to prevent any abuse of user data and implement system access restrictions.
Security through data
© 2023 | CyberMaterial | All rights reserved.
World’s #1 Cybersecurity Repository
© 2022 Cybermaterial - Security Through Data .