Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

CVE-2023-38545: High Severity cURL Vulnerability Detection

October 12, 2023October 14, 2025 Sysdig

Curl disclosed a high-severity heap buffer overflow in its SOCKS5 handling (CVE-2023-38545) that can overflow a heap buffer during the SOCKS5 proxy handshake and potentially lead to undefined behavior or RCE. Detection is difficult when libcurl is embedded in …

Read More
Threat Research

Users of Telegram, AWS, and Alibaba Cloud targeted in latest supply chain attack

October 12, 2023October 13, 2025 CTI

An attacker (pseudonym “kohlersbtuh15”) uploaded multiple typosquatted and starjacked Python packages to PyPI in September 2023 to target developers using Telegram, AWS, and Alibaba Cloud; the packages hide malicious logic inside library functions so the code …

Read More
Threat Research

Active exploitation of Cisco IOS XE Software Web Management User Interface vulnerabilities

October 12, 2023October 20, 2025 Securonix

Talos Incidents Response reports active exploitation of Cisco IOS XE Web UI vulnerabilities CVE-2023-20198 and CVE-2023-20273, delivering a Lua-based implant named BadCandy to compromised devices. The operation includes unauthorized local user creation, privil…

Read More
Threat Research

Grayling: Previously Unseen Threat Actor Targets Multiple Organizations in Taiwan

October 12, 2023October 17, 2025 Securonix

Symantec Threat Hunter Team attributes a new APT group, Grayling, to a campaign targeting multiple organizations in Taiwan’s manufacturing, IT, and biomedical sectors, with additional victims in the Pacific Islands government, Vietnam, and the U.S. The operati…

Read More
Threat Research

Peeling off QR Code Phishing Onion

October 12, 2023October 14, 2025 Securonix

Two QR-code-based phishing campaigns are analyzed, showing attackers bypass email security by using images of text and QR codes in emails and attachments instead of readable URLs. The campaigns employ layered evasion (redirection, anti-bot checks, CAPTCHA evas…

Read More
Threat Research

IZ1H9 Campaign Enhances Its Arsenal with Scores of Exploits | FortiGuard Labs

October 11, 2023October 17, 2025 Fortinet

FortiGuard Labs observed the IZ1H9 Mirai-based campaign expand with 13 exploit payloads targeting numerous router, camera, and device vendors to achieve remote code execution and grow its botnet. The campaign uses shell-script downloaders (e.g., l.sh), XOR-obf…

Read More
Threat Research

Dark Angels | ESXi Ransomware Borrows Code & Victimology From RagnarLocker

October 11, 2023October 16, 2025 Securonix

Dark Angels Linux ESXi ransomware targeted Johnson Controls’ VMware ESXi servers in September 2023 and encrypts files using AES-256. SentinelOne’s analysis finds substantial overlap with RagnarLocker’s ESXi variant, suggesting shared code and victimology betwe…

Read More
Threat Research

Malicious “RedAlert – Rocket Alerts” application targets Israeli phone calls, SMS, and user information

October 11, 2023October 18, 2025 Securonix

Threat researchers uncovered a fake Android APK masquerading as the RedAlert – Rocket Alerts app, hosted on a deceptive site and designed to harvest extensive device data. The malware collects sensitive information and sends it to the attacker’s server, using …

Read More
Threat Research

PSA: Critical Unauthenticated Arbitrary File Upload Vulnerability in Royal Elementor Addons and Templates Being Actively Exploited

October 11, 2023October 13, 2025 Securonix

Wordfence warns of a critical unauthenticated vulnerability in Royal Elementor Addons and Templates for WordPress that lets attackers upload PHP files and achieve remote code execution, risking a full site compromise. Attacks have been active since mid-2023 wi…

Read More
Threat Research

MedusaLocker Ransomware: An In-Depth Technical Analysis and Prevention Strategies

October 11, 2023October 16, 2025 Securonix

MedusaLocker ransomware targets the hospital and healthcare sectors and uses AES and RSA encryption to lock victims’ data. The analysis outlines its techniques for persistence, privilege escalation, service/process termination, shadow copy deletion, network pr…

Read More
Threat Research

Threat Actors Exploit Atlassian Confluence CVE-2023-22515 for Initial Access to Networks | CISA

October 10, 2023October 15, 2025 Securonix

The advisory describes active exploitation of CVE-2023-22515 in Atlassian Confluence Data Center and Server, enabling threat actors to create unauthorized Confluence administrator accounts and gain initial access. It also covers post-exploitation data exfiltra…

Read More
Threat Research

Exposing Infection Techniques Across Supply Chains and Codebases

October 9, 2023October 15, 2025 TrendMicro

The article analyzes multi-stage supply-chain infections where threat actors trojanize GitHub repositories and malicious PyPi packages to deliver Python-based droppers and information stealers. Key techniques include a novel “exec smuggling” pattern (whitespac…

Read More
Threat Research

Phylum Discovers SeroXen RAT in Typosquatted NuGet Package

October 9, 2023October 15, 2025 Securonix

Phylum detected a typosquatted NuGet package that delivered the SeroXen RAT, demonstrating how open-source ecosystems can be abused. The post details the typosquatted package, its obfuscated payload chain (PowerShell, batch scripts, DLLs), and download-count a…

Read More
Threat Research

AgentTesla Spreads Through CHM And PDF Files In Recent Attacks – Cyble

October 7, 2023October 14, 2025 Securonix

Recent AgentTesla campaigns show the malware spreading via CHM and PDF attachments, using a Gzip-compressed CHM lure that downloads a PowerShell script to start the infection. The chain employs layered Base64-encoded payloads and a .NET loader DLL to inject Ag…

Read More
Threat Research

Analysis Report on Lazarus Threat Group’s Volgmer and Scout Malware – ASEC BLOG

October 6, 2023October 16, 2025 Securonix

The article analyzes Lazarus Group’s Volgmer backdoor and Scout downloader, detailing how Volgmer operated from 2014 and how Scout began replacing Volgmer around 2022, including their C2, encryption, and anti-forensic techniques. It also covers dropper behavio…

Read More

Posts pagination

Previous 1 … 374 375 376 … 491 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.