Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

ZenRAT: Malware Brings More Chaos Than Calm  | Proofpoint US

September 21, 2023October 21, 2025 Securonix

Proofpoint details ZenRAT, a modular Windows RAT distributed through fake Bitwarden installation packages on bitwariden.com, featuring masquerading, anti-VM checks, and data exfiltration. It gathers host information and browser data, then sends it to a C2 via …

Read More
Threat Research

Smishing Triad Impersonates Emirates Post to Target UAE Citizens

September 21, 2023October 20, 2025 Securonix

Smishing Triad has expanded its UAE-focused operations, using domain registrations via Gname.com to host fake Emirates Post lures and geo-targeted delivery of smishing pages. The group hijacks iCloud accounts to send iMessages, leverages Dark Web data for geo-…

Read More
Threat Research

Earth Lusca Employs New Linux Backdoor, Uses Cobalt Strike for Lateral Movement

September 20, 2023October 17, 2025 TrendMicro

Trend Micro researchers identified a new Linux backdoor, SprySOCKS, used by the China-linked group Earth Lusca; it is derived from the Trochilus RAT and implements a SOCKS proxy plus an AES-ECB encrypted C2 protocol. The actor delivers SprySOCKS via a mandibul…

Read More
Threat Research

Lookout Discovers Surveillance Campaigns Targeting Uyghurs | Threat Intel

September 20, 2023October 25, 2025 Lookout

Lookout researchers analyzed BadBazaar, a mobile surveillanceware family attributed to APT15, describing an Android variant with broad data‑collection features and an iOS variant (masqueraded as TibetOne) with more limited but still privacy‑invasive capabiliti…

Read More
Threat Research

Persistent Attempts at Cyberespionage Against Southeast Asian Government Target Have Links to Alloy Taurus

September 20, 2023October 15, 2025 Securonix

Two-wave or multiwave intrusions targeted a Southeast Asian government, with a moderate confidence attribution to Alloy Taurus (GALLIUM) operating on behalf of Chinese state interests. The operations exploited Exchange Server vulnerabilities to deploy web shel…

Read More
Threat Research

Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government

September 20, 2023October 14, 2025 Securonix

A Southeast Asian government target was observed in a CL-STA-0046 activity cluster potentially linked to the Gelsemium APT group, showcasing a rare blend of backdoors and proxy tools used over six months in 2022–2023. The cluster prominently used OwlProxy and …

Read More
Threat Research

Indian Taxpayers Face A Multifaceted Threat With Drinik Malware’s Return – Cyble

September 19, 2023October 14, 2025 Securonix

CRIL researchers document Drinik malware’s return with a broader target set in India, including UPI apps, plus new features to sustain persistence and complicate removal. The updated variant uses smishing to deliver a malicious itrMobile APK, exploits Android …

Read More
Threat Research

Behind the Scenes of BBTok: Analyzing a Banker’s Server Side Components – Check Point Research

September 19, 2023October 21, 2025 Securonix

Check Point Research details an active BBTok banker campaign in Latin America that uses server-side components and LOLBins to deliver unique payloads per victim, evading detection across Brazil and Mexico. The report covers how infection chains are generated o…

Read More
Threat Research

Exploring Winrar Vulnerability (CVE-2023-38831) | McAfee Blog

September 19, 2023October 23, 2025 Securonix

McAfee Labs describes CVE-2023-38831, a critical RCE in WinRAR before version 6.23 exploited by weaponized ZIP archives that execute a malicious script during extraction. The article traces the infection chain from a crafted archive targeting traders to a C2 c…

Read More
Threat Research

Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit

September 19, 2023October 17, 2025 Securonix

SentinelLabs observed a new threat activity cluster by an unknown actor named Sandman targeting telecommunications providers across the Middle East, Western Europe, and the South Asian subcontinent, using a LuaJIT-based modular backdoor named LuaDream. The Lua…

Read More
Threat Research

Unveiling the Shadows: The Dark Alliance between GuLoader and Remcos – Check Point Research

September 19, 2023October 16, 2025 Securonix

Checkpoint researchers expose a dual-use ecosystem where GuLoader and Remcos are marketed as legitimate tools, with GuLoader acting as a crypter to help Remcos evade antivirus and deliver payloads. The investigation ties BreakingSecurity and VgoStore to ThePro…

Read More
Threat Research

From ScreenConnect to Hive Ransomware in 61 hours

September 19, 2023October 20, 2025 TheDFIR

Multi-RMM intrusion in 2022 leveraged ScreenConnect to stage Hive ransomware, illustrating how adversaries abuse legitimate remote monitoring tools for initial access, C2, and lateral movement. The operation progressed through Cobalt Strike and Metasploit payl…

Read More
Threat Research

Ransomware Roundup – Retch and S.H.O. | FortiGuard Labs

September 19, 2023October 19, 2025 Securonix

Fortinet FortiGuard Labs’ bi-weekly Ransomware Roundup analyzes two Windows-focused variants, Retch and S.H.O, detailing their file-encrypting behavior, ransom notes, and attacker notes. The post also outlines Fortinet protections, recommended defenses, and as…

Read More
Threat Research

Cyberespionage Attacks Against Southeast Asian Government Linked to Stately Taurus, Aka Mustang Panda

September 19, 2023October 31, 2025 Securonix

Unit 42 analyzes CL-STA-0044, a Stately Taurus–linked cyberespionage operation targeting a Southeast Asian government from 2021 through 2023, focusing on establishing long-term footholds and exfiltrating sensitive documents. The campaign leveraged ToneShell, S…

Read More
Threat Research

Examining the Activities of the Turla APT Group

September 19, 2023October 14, 2025 Securonix

This article surveys Turla, a long-running Russian APT, detailing its evolving toolkit and the MITRE techniques linked to campaigns from 2014 to 2023. It highlights multi-stage attacks, Linux and Windows backdoors, watering holes, phishing, and C2 methods, inc…

Read More

Posts pagination

Previous 1 … 378 379 380 … 491 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.