Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Unveiling the Shadows: The Dark Alliance between GuLoader and Remcos – Check Point Research

September 19, 2023October 16, 2025 Securonix

Checkpoint researchers expose a dual-use ecosystem where GuLoader and Remcos are marketed as legitimate tools, with GuLoader acting as a crypter to help Remcos evade antivirus and deliver payloads. The investigation ties BreakingSecurity and VgoStore to ThePro…

Read More
Threat Research

npm packages caught exfiltrating Kubernetes config, SSH keys

September 18, 2023October 14, 2025 Securonix

Sonatype researchers are tracking an ongoing npm registry campaign where malicious packages are used to retrieve and exfiltrate Kubernetes configuration and SSH keys to an external server. At least 14 such packages have been identified, impersonating legitimat…

Read More
Threat Research

SmokeLoader’s Plugins | Bitsight

September 18, 2023October 15, 2025 Securonix

SmokeLoader has expanded beyond downloading and dropping other malware by offering plugins that harvest data from infected machines, including browser data, emails, cookies, and passwords. The Bitsight analysis dissects eight plugins (four 32-bit and four 64-b…

Read More
Threat Research

Detecting JanelaRAT with Yara and THOR

September 15, 2023October 20, 2025 CTI

In the last weeks, we observed an increase in .NET based malware using DLL sideloading. A prominent example is JanelaRAT, a recent campaign targeting Latin American FinTech users.Their initial attack involves a phishing email, mainly in Portuguese language. The user is tricked into running a VisualBasic script, which then downloads the…

Read More
Threat Research

RedLine/Vidar Abuses EV Certificates, Shifts to Ransomware

September 15, 2023October 16, 2025 TrendMicro

Threat actors using RedLine and Vidar initially deployed EV code-signed info stealers and later reused the same spear-phishing delivery chain to deliver ransomware (Ransom.Win64.CYCLOPS.A / “Knight” family). The campaign used double-extension attachments, remo…

Read More
Threat Research

Fake CVE-2023-40477 Proof of Concept Leads to VenomRAT

September 15, 2023October 14, 2025 Securonix

Unit 42 researchers analyzed a fake PoC for CVE-2023-40477 in WinRAR that ultimately delivered VenomRAT via a multi-stage infection chain based on a PoC for CVE-2023-25157. The actors used social engineering and publicly available PoC code to lure miscreants i…

Read More
Threat Research

Cado Security Labs Researchers Witness a 600X Increase in P2Pinfect Traffic

September 15, 2023October 13, 2025 Securonix

Cado Security Labs observed a 600x spike in P2Pinfect activity, with rapid variant updates and expanding geographic reach across major cloud providers. The analysis covers how the botnet infects Redis on Linux hosts, persists via cron and SSH mechanisms, and s…

Read More
Threat Research

Dark Web Profile: NoEscape Ransomware – SOCRadar® Cyber Intelligence Inc.

September 15, 2023October 15, 2025 Securonix

NoEscape Ransomware emerged in 2023 as a RaaS, closely tying to Avaddon through similar encryption and deployment tactics, while expanding to Windows and Linux payloads and leveraging a TOR-based platform for victim disclosure. It combines multi-extortion with…

Read More
Threat Research

HiddenGh0st Malware Attacking MS-SQL Servers – ASEC BLOG

September 15, 2023October 16, 2025 Securonix

Gh0st RAT variants, including HiddenGh0st, are actively used to attack MS-SQL servers and deploy a public rootkit to hide infections and protect malicious activity. The operation collects extensive system data, exfiltrates credentials via Mimikatz, and enables…

Read More
Threat Research

Silent Skimmer: Online Payment Scraping Campaign Shifts Targets From APAC to NALA

September 15, 2023October 22, 2025 Securonix

BlackBerry researchers identify a financially motivated campaign, dubbed “Silent Skimmer,” targeting online payment infrastructure across APAC and NALA with web-server compromises to steal payment data. The operation leverages vulnerabilities in web applicatio…

Read More
Threat Research

Chinese Malware Appears in Earnest Across Cybercrime Threat Landscape | Proofpoint US

September 15, 2023October 15, 2025 Securonix

Proofpoint notes a rise in Chinese-themed malware campaigns targeting Chinese-language speakers, including Sainbox (Gh0stRAT variant) and the newly identified ValleyRAT, alongside legacy Purple Fox. The campaigns use Chinese-language lures and diverse delivery…

Read More
Threat Research

Emerging Threat: Understanding The PySilon Discord RAT’s Versatile Features – Cyble

September 14, 2023October 14, 2025 Securonix

CRIL researchers document widespread use of the open-source PySilon RAT by multiple threat actors, with VirusTotal reporting over 300 samples since June 2023. PySilon evolved from v1.0 (Dec 2022) to v3.6 (Aug 2023) and now offers extensive capabilities such as…

Read More
Threat Research

Weaponising VMs to bypass EDR – Akira ransomware

September 14, 2023October 19, 2025 Securonix

CyberCX DFIR describes Akira ransomware leveraging Hyper-V to deploy on new, unmonitored VMs to bypass EDR, causing widespread damage to attached VMs. The piece also covers attacker methods from initial access to post-exploitation, defense evasion with BYOVD t…

Read More
Threat Research

Latest evolution of ‘pig butchering’ scam lures victim into fake mining scheme

September 14, 2023October 20, 2025 Securonix

Sophos X-Ops documents a surge in pig butchering scams that push victims into fake liquidity mining schemes, exploiting DeFi concepts and social engineering rather than malware. A detailed victim case shows romance-based outreach via MeetMe, persistent multi-c…

Read More
Threat Research

LockBit Ransomware Gang Attacks an MSP and Two Manufacturers Using…

September 14, 2023October 16, 2025 Securonix

eSentire intercepted three LockBit affiliate ransomware attacks aimed at an MSP and two manufacturers, halting them before widespread impact. The report highlights how attackers used RMM tools and remote-access software—and even brought their own tools—to prop…

Read More

Posts pagination

Previous 1 … 379 380 381 … 491 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.