Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

MedusaLocker Ransomware: An In-Depth Technical Analysis and Prevention Strategies – Blogs on Information Technology, Network & Cybersecurity | Seqrite

October 16, 2023October 16, 2025 Seqrite

This write-up details MedusaLocker’s technical behavior, including privilege escalation via a UAC bypass, persistence through %AppData% duplication and registry entries, termination of backup/DB services, shadow-copy removal, and AES+RSA file encryption. It al…

Read More
Threat Research

The forgotten malvertising campaign

October 16, 2023October 13, 2025 Securonix

An under-the-radar malvertising campaign targets Notepad++ users via compromised ad accounts, delivering time-sensitive .hta payloads and decoy Notepad++ pages. It fingerprint VM environments, uses a unique per-user ID, and communicates with a remote C2 domain…

Read More
Threat Research

Ransomware actor exploits unsupported ColdFusion servers—but comes away empty-handed

October 16, 2023October 16, 2025 Securonix

Threat actors targeted obsolete ColdFusion 11 servers to gain access and pivot to deploying ransomware, using leaked LockBit 3.0 code, but Sophos blocked all attempts on a customer network. The activity ties to a threat actor calling itself BlackDogs 2023, who…

Read More
Threat Research

Qubitstrike – An Emerging Malware Campaign Targeting Jupyter Notebooks

October 16, 2023October 17, 2025 Securonix

Qubitstrike is a sophisticated cryptojacking campaign targeting exposed Jupyter Notebooks, leveraging Codeberg for payload hosting and Discord for C2, with cloud credentials targeted for later exploitation. The operators deploy XMRig, Diamorphine rootkit, and …

Read More
Threat Research

A hack in hand is worth two in the bush

October 16, 2023October 13, 2025 Securonix

Researchers analyze the cyber dimension of the Israel-Hamas conflict, highlighting hacktivist groups Cyber Av3ngers and Moses Staff and their impact on critical infrastructure. The analysis links the October 8 Dorad power station incident to Moses Staff leaks …

Read More
Threat Research

Voice Phishing Campaigns Using Access Keys | Cofense

October 15, 2023October 20, 2025 admin

Cofense observed a voice-message phishing campaign that used a dated HTML attachment and an included “access key” in the email to trick recipients into interacting with a staged voice message. The lure leads users to download a file hosted on an AWS URL disgui…

Read More
Threat Research

LinkedIn Smart Links Fuel Credential Phishing Campaign

October 14, 2023October 18, 2025 admin

Cofense observed a large credential-phishing campaign that abused LinkedIn Smart Links (Sales Navigator team/business links) to deliver Microsoft Office credential harvesters via trusted LinkedIn URLs, allowing emails to bypass secure email gateways. The campa…

Read More
Threat Research

DarkGate Opens Organizations for Attack via Skype, Teams

October 13, 2023October 14, 2025 TrendMicro

Trend Micro observed a campaign that uses compromised Skype and Microsoft Teams accounts to deliver a VBA/VBS loader which retrieves an AutoIt-based DarkGate payload. The chain abuses renamed/obfuscated binaries (curl.exe), AutoIt scripts (.au3), and LNK short…

Read More
Threat Research

Void Rabisu Targets Female Political Leaders with New Slimmed-Down ROMCOM Variant

October 13, 2023October 16, 2025 TrendMicro

Void Rabisu continues to evolve its ROMCOM backdoor family, delivering a slimmed-down variant (PEAPOD) via a fake Women Political Leaders (WPL) Summit website that lures victims to a OneDrive-hosted SFX downloader signed by Elbor LLC. The installer performs in…

Read More
Threat Research

“EtherHiding” — Hiding Web2 Malicious Code in Web3 Smart Contracts

October 13, 2023October 16, 2025 Guardio-Security

Threat actors behind the “ClearFake” campaign have shifted from Cloudflare Workers to hosting malicious JavaScript payloads inside Binance Smart Chain (BSC) smart contracts, allowing read-only eth_call requests from compromised WordPress sites to retrieve and …

Read More
Threat Research

Blocking Dedicated Attacking Hosts Is Not Enough: In-Depth Analysis of a Worldwide Linux XorDDoS Campaign

October 13, 2023October 17, 2025 Securonix

The XorDDoS Trojan campaigns compromised Linux devices to form a globally distributed botnet used for DDoS attacks, orchestrated through a resilient C2 network that migrated from dedicated resources to legitimate public hosting. The analysis covers attacking b…

Read More
Threat Research

Kimsuky Threat Group Uses RDP to Control Infected Systems – ASEC BLOG

October 13, 2023October 16, 2025 Securonix

Kimsuky, a North Korea–sponsored threat group, leverages spearphishing and a suite of backdoors, infostealers, and remote-control tools to gain access and exfiltrate data from targets. The operation prominently relies on RDP and related tools (including RDP wr…

Read More
Threat Research

Looking for CVE-2023-43261 in the Real World – Blog – VulnCheck

October 13, 2023October 22, 2025 Securonix

CVE-2023-43261 likely saw in-the-wild exploitation of Milesight industrial cellular routers, but not at scale, and the CVE description itself is incomplete and sometimes inaccurate. A real-world write-up shows the flaw allowed remote access to the router’s web…

Read More
Threat Research

Disclosing the BLOODALCHEMY backdoor — Elastic Security Labs

October 13, 2023October 17, 2025 Securonix

BloodAlchemy is a backdoor shellcode loaded into a signed benign process and linked to the REF5961 intrusion set. Elastic Security notes its active development, multiple loading and persistence modes, and a flexible C2/communication design. Hashtags: #BloodAlc…

Read More
Threat Research

Operation King TUT: The Universe of Threats in LATAM

October 13, 2023October 14, 2025 Securonix

ESET researchers analyze LATAM threats under Operation King TUT, noting a shift to high‑value targets and evolving evasion methods. The study covers campaigns from 2019–2023, highlighting spearphishing, PowerShell/VBScript loaders, and RATs like njRAT and Asyn…

Read More

Posts pagination

Previous 1 … 373 374 375 … 491 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.