Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Unpacking the Use of Steganography in Recent Malware Attacks – ANY.RUN’s Cybersecurity Blog

October 19, 2023October 17, 2025 Securonix

The article examines how steganography is being revived in recent malware campaigns to hide payloads inside benign files like images, and demonstrates a hands-on analysis using ANY.RUN and CyberChef to extract and inspect hidden code. It covers phishing-based …

Read More
Threat Research

Rusty Droid: Under the Hood of a Dangerous Android RAT – K7 Labs

October 18, 2023October 18, 2025 K7computing

Rusty Droid is an Android RAT that masquerades as Chrome (package com.catajuhufepusuwo.xenonome), requests Accessibility service, then decrypts and loads a DEX payload to steal credentials, SMS, and other sensitive data while contacting a hardcoded C2. The mal…

Read More
Threat Research

Beware Lumma Stealer Distributed via Discord CDN

October 18, 2023October 16, 2025 TrendMicro

Threat actors are distributing the information-stealer Lumma Stealer via Discord by hosting malicious installers on Discord’s CDN and luring victims with direct-message social engineering. The malware executes a downloaded binary that contacts the C2 domain ga…

Read More
Threat Research

Anomali Cyber Watch I Cyber Security News on Latest Threats | Anomali

October 18, 2023October 13, 2025 Securonix

Anomali’s Cyber Watch roundup covers multiple campaigns including ROMCOM 4.0 (PEAPOD) backdoors targeting defense and government sectors, a typosquatted RedAlert Android infostealer, EtherHiding via blockchain hosting, the NoEscape ransomware, and ShellBot DDo…

Read More
Threat Research

Discord, I Want to Play a Game

October 18, 2023October 15, 2025 Securonix

Malware researchers analyzed how Discord is being abused to download payloads and exfiltrate data, including a Ukrainian-targeted sample that points to emerging APT-like activity. The attack chain leverages Discord’s CDN to fetch a next-stage payload and Disco…

Read More
Threat Research

Fileless Pure Clipper Malware: Italian Users In The Crosshairs – Cyble

October 18, 2023October 14, 2025 Securonix

Cyble reports a threat actor targeting Italian-speaking users with a Tor Browser phishing site delivering a fileless Pure Clipper campaign. The operation uses a .NET dropper obfuscated with SmartAssembly, loads loader/crypto payloads, stores data in the regist…

Read More
Threat Research

Akira Stealer : An Undetected Python Based Info-stealer – CYFIRMA

October 18, 2023October 16, 2025 Securonix

Akira Stealer is a Python-based information stealer offered as Malware-as-a-Service (MaaS) via a dedicated portal at Akira.red, with Telegram used for updates and command-and-control. It harvests credentials, financial data, and system information, exfiltratin…

Read More
Threat Research

QuasarRAT’s Dual DLL Sideloading Technique

October 18, 2023October 13, 2025 Securonix

QuasarRAT employs a novel dual DLL sideloading technique using two trusted Microsoft processes, ctfmon.exe and calc.exe, to stealthily deploy payloads and evade detection. The analysis covers the two-phase execution flow, resource encryption/decryption, memory…

Read More
Threat Research

A Modern Approach to Adaptive Threat Hunting Methodologies

October 18, 2023October 14, 2025 Securonix

Threat hunting today blends structured methodologies, real-time data analysis, and adaptive automation to uncover anomalies, threats, and attacker activity across logs, networks, and endpoints. The article showcases traditional approaches, a modern futuristic …

Read More
Threat Research

BlackCat Climbs the Summit With a New Tactic

October 17, 2023October 19, 2025 Securonix

BlackCat operators introduced a new tool called Munchkin that uses a customized Alpine VM to deploy and propagate the BlackCat payload across remote machines and SMB shares. Unit 42 explains how Munchkin runs inside a VirtualBox VM, decrypts strings at runtime…

Read More
Threat Research

Clever malvertising attack uses Punycode to look like KeePass’s official website

October 17, 2023October 18, 2025 Securonix

Threat actors leveraged malvertising and a Punycode-based domain to impersonate KeePass, directing users to a lookalike site. The campaign delivers a malicious MSIX installer signed to look legitimate, which runs PowerShell code linked to the FakeBat family an…

Read More
Threat Research

DarkGate malware campaign

October 17, 2023October 17, 2025 Securonix

Vietnamese threat actor clusters are using Malware as a Service infostealers and RATs (DarkGate, Ducktail, Lobshot, Redline stealer) to hit the digital marketing sector, with a strong focus on Facebook Business accounts. The campaigns show heavy overlap in lur…

Read More
Threat Research

Crambus: New Campaign Targets Middle Eastern Government

October 17, 2023October 14, 2025 Securonix

Crambus (OilRig/APT34) conducted an eight-month intrusion against a Middle Eastern government in early 2023, stealing files, passwords, and emails while deploying backdoors and credential dumping tools. The operation relied on PowerShell backdoors (PowerExchan…

Read More
Threat Research

Multiple North Korean threat actors exploiting the TeamCity CVE-2023-42793 vulnerability | Microsoft Security Blog

October 17, 2023October 14, 2025 Securonix

Two North Korean threat actors, Diamond Sleet and Onyx Sleet, were observed exploiting CVE-2023-42793 in JetBrains TeamCity servers to gain access and persist in victim environments. They used two distinct attack paths—ForestTiger backdoor deployment and DLL s…

Read More
Threat Research

BbyStealer Malware Resurfaces, Sets Sights On VPN Users – Cyble

October 17, 2023October 15, 2025 Securonix

Cyble Research and Intelligence Labs uncovered a phishing-driven VPN malware campaign that delivers BbyStealer via VPN installer downloads. The campaign impersonates VPN services, drops BbyStealer to steal browser and crypto wallet data, and even performs a cl…

Read More

Posts pagination

Previous 1 … 372 373 374 … 491 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.