Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Triangulation: validators, post-compromise activity and modules

October 23, 2023October 14, 2025 SecureList

In this report Kaspersky shares insights into the validation components used in Operation Triangulation, TriangleDB implant post-compromise activity, as well as details of some additional modules.

Read More
Threat Research

Cobalt Strike .VBS Loader – Decoding with Advanced CyberChef and Emulation

October 23, 2023October 13, 2025 CTI

Manually decoding a Cobalt Strike .vbs Loader utilising advanced CyberChef and Shellcode Emulation.

Read More
Threat Research

NetSupport Intrusion Results in Domain Compromise

October 23, 2023October 15, 2025 TheDFIR

An extensive NetSupport RAT intrusion in January 2023 shows attackers using phishing to deliver a malicious JavaScript loader, which then deployed a PowerShell payload to install NetSupport and establish persistence. The operation progressed to domain compromi…

Read More
Threat Research

Cobalt Strike Malware Analysis With CyberChef and Emulation – .HTA Loader Example

October 22, 2023October 13, 2025 CTI

Decoding a .hta script with CyberChef and analysing Shellcode with the SpeakEasy Emulator.

Read More
Threat Research

Higaisa APT Resurfaces Via Phishing Website Targeting Chinese Users – Cyble

October 21, 2023October 13, 2025 Securonix

Cyble CRIL uncovered a new Higaisa APT operation that uses a phishing site impersonating legitimate VPN software to deliver a Rust-based payload. The malware features anti-debugging, shellcode decryption, and encrypted C2 communication, with connections to add…

Read More
Threat Research

Netskope Threat Coverage: Menorah

October 21, 2023October 20, 2025 Securonix

Netskope analyzed a malicious Word document delivering a backdoor named Menorah attributed to APT34, distributed via spear-phishing and obfuscated VBA. The payload drops a .NET executable, persists via a scheduled task, and communicates with a C2 server over H…

Read More
Threat Research

Hamas Application Infrastructure Reveals Possible Overlap With TAG-63 and Iranian Threat Activity

October 20, 2023October 16, 2025 RecordedFuture

Insikt Group identified an application disseminated on a Telegram Channel used by members or supporters of the Hamas terrorist organization

Read More
Threat Research

Another InfoStealer Enters the Field, ExelaStealer | FortiGuard Labs

October 20, 2023October 16, 2025 Fortinet

ExelaStealer is a new Python-based infostealer distributed as both an open-source project and a paid, customizable build that targets Windows to harvest browser credentials, cookies, clipboard contents, screenshots, and keystrokes. FortiGuard Labs’ analysis sh…

Read More
Threat Research

Cobalt Strike Loader Deobfuscation Using CyberChef and Emulation (.hta files)

October 20, 2023October 20, 2025 CTI

Decoding a .hta script with CyberChef and analysing Shellcode with the SpeakEasy Emulator.

Read More
Threat Research

Hong Kong residents targeted in malvertising campaigns for WhatsApp, Telegram

October 20, 2023October 17, 2025 Securonix

Two campaigns targeted at Hong Kong residents used malvertising to push fake WhatsApp Web and Telegram pages, tricking victims into scanning QR codes or downloading malware. The operators aimed to steal data, impersonate accounts, and compromise devices, with …

Read More
Threat Research

Organizations under attack from cryptominer-keylogger-backdoor combo

October 19, 2023October 15, 2025 SecureList

Cybercriminals attack government, law enforcement, non-profit organizations, agricultural and commercial companies by slipping a cryptominer, keylogger, and backdoor into their systems.

Read More
Threat Research

Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan

October 19, 2023October 13, 2025 Securonix

Cisco Talos assesses that YoroTrooper is a Kazakhstan-origin, espionage-focused threat actor active since June 2022, with language and currency cues pointing to Kazakhstan and a focus on CIS government targets. The group disguises its operations as Azerbaijan,…

Read More
Threat Research

Атаки на индустриальный и государственный секторы РФ

October 19, 2023October 20, 2025 Securonix

A Russian-targeted phishing campaign delivered a NSIS-based loader that installs backdoors and data-stealing components, with Go-written UsrRunVGA.exe as the main backdoor. The operation operated in two waves, using anti-virtualization checks, encrypted data e…

Read More
Threat Research

A Deep Dive into Cactus Ransomware

October 19, 2023October 17, 2025 Securonix

Cactus ransomware, discovered in March 2023, uses a mutex to ensure a single active copy and persistence via a scheduled task named “Updates Check Task.” It encrypts files with AES (OpenSSL), stores the public RSA key encrypted inside the binary, and renames e…

Read More
Threat Research

Malware stories: Deworming the XWorm

October 19, 2023October 16, 2025 Securonix

XWorm is a modular .NET RAT analyzed in-depth, detailing a multi-stage unpacking and deobfuscation process that culminates in a runnable payload. The write-up walks through the analysis from initial malspam delivery to the final unpacked sample, including conf…

Read More

Posts pagination

Previous 1 … 371 372 373 … 491 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.