Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

THÔNG TIN CÁC MỐI ĐE DỌA BẢO MẬT TRONG THÁNG 01 – 2021

September 4, 2023October 15, 2025 Securonix

This monthly GTSC security overview highlights Chimera Group’s multi-target intrusions using compromised credentials, cloud services, and Cobalt Strike beacons, and covers a separate JsOutProx JavaScript RAT campaign targeting Asian government entities, plus a…

Read More
Threat Research

New Hive0117 phishing campaign imitates conscription summons to deliver DarkWatchman malware

September 4, 2023October 15, 2025 Securonix

A new Hive0117 phishing campaign impersonates Russian conscription notices to deliver the DarkWatchman malware, targeting Russian-speaking individuals across energy, finance, transport, and software security sectors. IBM X-Force researchers note DarkWatchman o…

Read More
Threat Research

Phishing via Google Looker Studio – Check Point Blog

September 2, 2023October 18, 2025 Securonix

Hackers are abusing Google Looker Studio to host fake crypto-credential pages, part of a growing BEC 3.0 campaign. The attackers rely on legitimate Looker Studio infrastructure and social engineering to steal money and credentials from end users. #LookerStudio…

Read More
Threat Research

Cybercriminals target graphic designers with GPU miners

September 2, 2023October 16, 2025 Securonix

Talos reports a campaign that abuses Advanced Installer to drop GPU-coin-mining malware inside trojanized installers for graphic-design tools. The operation deploys M3_Mini_Rat as a backdoor and miners PhoenixMiner and lolMiner, targeting French-language softw…

Read More
Threat Research

New Warp Malware drops modified Stealerium Infostealer – Blogs on Information Technology, Network & Cybersecurity | Seqrite

September 2, 2023October 17, 2025 Securonix

Warp Loader, Warp Dropper, and Stealerium form a modern multi-stage stealer malware chain that delivers via email, downloads a dropper, and exfiltrates sensitive data to a Telegram-based C2. The article details anti-analysis techniques, UAC bypass, and a set o…

Read More
Threat Research

Multiple Threats Target Adobe ColdFusion Vulnerabilities | FortiGuard Labs

September 1, 2023October 15, 2025 Fortinet

FortiGuard Labs found active exploitation attempts against Adobe ColdFusion deserialization flaws, where attackers inject payloads into the /CFIDE/adminapi/accessmanager.cfc endpoint to probe, spawn reverse shells, and deploy multiple malware families. Observe…

Read More
Threat Research

Mac users targeted in new malvertising campaign delivering Atomic Stealer

September 1, 2023October 14, 2025 Securonix

A new malvertising campaign targets Mac users with an OSX version of Atomic Stealer (AMOS), delivered through deceptive ads and a phishing page. The payload is an ad-hoc signed DMG that bypasses GateKeeper and exfiltrates stolen data to a criminal back end. #A…

Read More
Threat Research

Scarleteel 2.0 and the MITRE ATT&CK framework

September 1, 2023October 13, 2025 Securonix

Scarleteel 2.0 is analyzed through the MITRE ATT&CK framework to map how adversaries move from an exposed Kubernetes/JupyterLab deployment to credential theft, execution, privilege escalation, lateral movement in AWS, and data exfiltration. The investigation a…

Read More
Threat Research

A Bucket of Phish: Attackers Shift Tactics with Cloudflare R2 Public Buckets

September 1, 2023October 15, 2025 Securonix

Trustwave SpiderLabs details a surge in phishing campaigns that abuse Cloudflare R2 public buckets (r2.dev) to host malicious links. The campaigns combine impersonation of legitimate brands, fake login pages, and base64-obfuscated redirects, with thousands of …

Read More
Threat Research

New MaaS Prysmax Launches Fully Undetectable Infostealer – CYFIRMA

September 1, 2023October 18, 2025 Securonix

CYFIRMA documents a new malware-as-a-service, Prysmax, offering a fully undetectable information stealer, stealer, RAT, and botnet services. The Python-based Prysmax stealer exfiltrates crypto wallets, passwords, and cookies, uses PowerShell for stealthy actio…

Read More
Threat Research

VMConnect supply chain attack continues, evidence points to North Korea

August 31, 2023October 18, 2025 Reversinglabs

ReversingLabs discovered three additional malicious PyPI packages — tablediter, request-plus, and requestspro — that extend the VMConnect supply-chain campaign and use obfuscated payloads and C2 communications to fetch further stages. Analysis shows evasion te…

Read More
Threat Research

Distribution of Backdoor via Malicious LNK: RedEyes (ScarCruft) – ASEC BLOG

August 31, 2023October 14, 2025 Securonix

ASEC confirms a backdoor that was previously distributed as CHM is now spread via LNK files, using mshta to fetch and execute remote scripts and to receive commands from a threat actor’s server. The LNK payload is delivered with other malware in compressed fil…

Read More
Threat Research

Dark Web Profile: Medusa Ransomware (MedusaLocker) – SOCRadar® Cyber Intelligence Inc.

August 31, 2023October 17, 2025 Securonix

Medusa Ransomware (MedusaLocker) operates as a Ransomware-as-a-Service with global affiliates, encrypting data and demanding payment. It commonly gains initial access via vulnerable RDP and phishing, erases shadow copies, escalates privileges, and uses Medusa …

Read More
Threat Research

RedLine Stealer: Answers to Unit 42 Wireshark Quiz

August 31, 2023October 13, 2025 Securonix

Unit 42 provides the answers and deeper analysis for its July 2023 Wireshark quiz on a RedLine Stealer infection, detailing victim details, web traffic, and data exfiltration in a Windows AD environment. The post also lists indicators of compromise and maps ob…

Read More
Threat Research

Infamous Chisel Malware Analysis Report | CISA

August 31, 2023October 17, 2025 CISA

Infamous Chisel is a modular Android toolkit attributed to the Sandworm actor that persists by replacing /system/bin/netd, collects system and application files (including military-specific apps), and exfiltrates them on a regular schedule. It deploys Tor and …

Read More

Posts pagination

Previous 1 … 383 384 385 … 491 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.