Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

MuddyC2Go – Latest C2 Framework Used by Iranian APT MuddyWater Spotted in Israel | Deep Instinct Blog

November 8, 2023October 16, 2025 Deepinstinct

Deep Instinct identified a Go-based C2 framework named MuddyC2Go used by MuddyWater since at least 2020; attackers deliver PowerGUI-built executables containing embedded PowerShell that automatically connect to MuddyC2Go C2 servers and switch to dynamic DNS fo…

Read More
Threat Research

Python obfuscation traps

November 8, 2023October 17, 2025 CTI

Attackers published malicious Python packages masquerading as obfuscation tools that execute code at install time and fetch a secondary payload called BlazeStealer. The payload runs a Discord-based remote-access bot that enables data theft, keylogging, webcam …

Read More
Threat Research

CVE-2023-47246 Vulnerability – SysAid

November 8, 2023October 16, 2025 Securonix

SysAid’s on-premises software was found to have a zero-day path traversal vulnerability that allowed code execution, exploited by DEV-0950 (Lace Tempest). The attackers deployed a WebShell via a WAR file, loaded the GraceWire loader to inject into system proce…

Read More
Threat Research

IMPERIAL KITTEN Deploys Novel Malware Families

November 8, 2023October 13, 2025 Securonix

Imperial Kitten, an Iran-linked threat actor likely tied to the IRGC, conducted strategic web compromise operations and used novel malware families (e.g., IMAPLoader, StandardKeyboard) to target transportation, logistics, and technology sectors. CrowdStrike In…

Read More
Threat Research

Casting Light on BATLOADER: An Insight into its Role in Malware Delivery – Blogs on Information Technology, Network & Cybersecurity | Seqrite

November 8, 2023October 20, 2025 Securonix

BatLoader is a batch-based loader used to deliver payloads across multiple malware families, notably AgentTesla, QuasarRAT, AsyncRAT, Mallox Ransomware, and Cryptojacker campaigns, often via phishing. It loads payloads into memory through obfuscated PowerShell…

Read More
Threat Research

Predator AI | ChatGPT-Powered Infostealer Takes Aim at Cloud Platforms

November 7, 2023October 19, 2025 Securonix

Predator AI is a Python-based infostealer/hacktool targeting cloud platforms, integrating a GPTj-powered ChatGPT interface to simplify use. While not production-ready, it demonstrates how AI could streamline threat-actor workflows by enriching data and adding …

Read More
Threat Research

Chinese APT Targeting Cambodian Government

November 7, 2023October 14, 2025 Securonix

Unit 42 identifies malicious Chinese APT infrastructure masquerading as cloud backup services targeting Cambodian government entities, with long-running activity tied to geopolitical aims. The operation uses a multi-domain, multi-IP C2 setup, a Cowrie honeypot…

Read More
Threat Research

Warning Against Phobos Ransomware Distributed via Vulnerable RDP – ASEC BLOG

November 7, 2023October 14, 2025 Securonix

ASEC reports active distribution of Phobos ransomware using vulnerable RDP services as an entry point. The analysis covers Phobos’ file-encryption behavior, ransom-note mechanics, persistence, defense evasion, and network-shared-folder encryption. #Phobos #Dha…

Read More
Threat Research

SideCopy’s Multi-platform Onslaught: Leveraging WinRAR Zero-Day and Linux Variant of Ares RAT – Blogs on Information Technology, Network & Cybersecurity | Seqrite

November 6, 2023October 17, 2025 Seqrite

SEQRITE Labs observed multiple SideCopy campaigns that deploy Windows and Linux RATs using phishing lures, reused compromised domains, and exploitation of the WinRAR zero-day CVE-2023-38831 to trigger payloads. The actor delivered AllaKore, DRat, Key RAT and a…

Read More
Threat Research

Malware Unpacking With Hardware Breakpoints – Cobalt Strike Shellcode Loader

November 6, 2023October 15, 2025 CTI

Unpacking a simple Cobalt Strike loader using Debuggers and Hardware breakpoints.

Read More
Threat Research

Malvertiser copies PC news site to deliver infostealer | Malwarebytes

November 3, 2023October 18, 2025 Securonix

A malvertising campaign impersonates a legitimate Windows portal (WindowsReport.com) to push a CPU-Z installer, delivering a signed MSIX payload that runs a malicious PowerShell script via a loader called FakeBat to install the Redline stealer. The operation u…

Read More
Threat Research

GhostSec offers Ransomware-as-a-Service Possibly Used to Target Israel

November 3, 2023October 13, 2025 Securonix

GhostSec unveils GhostLocker, a Ransomware-as-a-Service framework, withsold through a dedicated Telegram channel and a current focus on Israel, signaling a shift in their activity. The report details GhostLocker’s build/operation, historical attacks against Is…

Read More
Threat Research

New Gootloader Variant “GootBot” Changes the Game in Malware Tactics – SOCRadar® Cyber Intelligence Inc.

November 3, 2023October 15, 2025 Securonix

Researchers identified a fresh Gootloader variant named “GootBot” that adds lateral movement and stealth to post-infection activity. It uses hardcoded C2 servers on compromised WordPress sites and avoids common off-the-shelf tools to deploy additional payloads…

Read More
Threat Research

Unveiling a New Threat The Millenium RAT – CYFIRMA

November 3, 2023October 15, 2025 Securonix

CYFIRMA analyzes Millenium RAT, a .NET Win32 RAT that has evolved from version 2.4 to 2.5 and is actively developed, with access sold on GitHub and details shared via Telegram. The report highlights the tool’s extensive data theft, anti-analysis, persistence, …

Read More
Threat Research

D0nut encrypt me, I have a wife and no backups 

November 3, 2023October 18, 2025 Securonix

An NCC Group analysis dives into the D0nut extortion group’s TTPs, detailing how they used Cobalt Strike, BYOVD, GPO modifications, RDP, and Rclone-based exfiltration to deploy ransomware. The report links potential ties to HelloXD and other groups like Hive/R…

Read More

Posts pagination

Previous 1 … 367 368 369 … 491 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.