Rhadamanthys 0.9.2: A Stealer That Keeps Evolving

Rhadamanthys 0.9.2 released: New version of the popular information stealer introduces changes that break existing tools and add fresh evasion techniques. Professionalization continues: Operators have rebranded as RHAD Security / Mythical Origin Labs and launched a polished website with multiple…

IoT Routers Used In Targeted In SMS Phishing

Scammers have been taking advantage of easily accessible cellular routers to send out massive text message-based phishing attacks, or The post IoT Routers Used In Targeted In SMS Phishing first appeared on CyberMaterial. This article has been indexed from CyberMaterial…

Georgia Tech Pays 875,000 In Cyber Fraud

The U.S. government is ramping up its efforts to ensure that defense contractors uphold their cybersecurity obligations, with a clear message that The post Georgia Tech Pays 875,000 In Cyber Fraud first appeared on CyberMaterial. This article has been indexed…

Hackers Target Oracle Apps For Extortion

A criminal group is extorting executives and tech departments at large organizations, claiming to have stolen data from their Oracle Corp. applications. The post Hackers Target Oracle Apps For Extortion first appeared on CyberMaterial. This article has been indexed from…

Facebook Scams Target Seniors With Malware

Attackers are targeting seniors on Facebook with a sophisticated scheme that combines social engineering with malicious software. They create fake groups The post Facebook Scams Target Seniors With Malware first appeared on CyberMaterial. This article has been indexed from CyberMaterial…

Android Spyware Poses As Signal And Totok

The cybersecurity company ESET recently discovered two new spyware families, dubbed ProSpy and ToSpy, that target Android users. The attackers disguised The post Android Spyware Poses As Signal And Totok first appeared on CyberMaterial. This article has been indexed from…

Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT

In a recent wave of targeted phishing campaigns, the Cavalry Werewolf cluster has escalated its operations by impersonating government officials and deploying both FoalShell and StallionRAT malware. These tactics underscore the urgency of maintaining continuous cyber intelligence monitoring and implementing…