Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

The Persistent Danger of Remcos RAT – CYFIRMA

August 18, 2023October 13, 2025 Securonix

Cyfirma analyzes a persistent Remcos RAT campaign driven by a broad infrastructure of malicious IPs and multi-stage payloads, delivering and controlling Remcos across compromised hosts. The report details how the attackers use PowerShell-enabled scripts, regis…

Read More
Threat Research

Lazarus Group exploits ManageEngine vulnerability to deploy QuiteRAT

August 18, 2023October 18, 2025 Securonix

Lazarus Group, a North Korean state-sponsored actor, targeted internet backbone infrastructure and healthcare entities in Europe and the United States, repeatedly reusing the same infrastructure across campaigns. They exploited a ManageEngine ServiceDesk vulne…

Read More
Threat Research

Lazarus Group’s infrastructure reuse leads to discovery of new malware

August 18, 2023October 17, 2025 Securonix

Lazarus Group’s latest campaign leverages CVE-2022-47966 in ManageEngine ServiceDesk to deploy multiple threats, introducing CollectionRAT alongside QuiteRAT and tying new activity to known Lazarus families. The operation shows continued infrastructure reuse, …

Read More
Threat Research

Malware-as-a-Service: Redline Stealer Variants Demonstrate a Low-Barrier-to-Entry Threat

August 18, 2023October 14, 2025 Securonix

EclecticIQ analysts describe RedLine Stealer variants in 2023 as redeveloped, low-barrier-to-entry campaigns that rely on loaders and botnets to deliver the malware. The latest iterations emphasize WMI-based information gathering, XOR/RC4 obfuscation, targeted…

Read More
Threat Research

No rest for the wicked: HiatusRAT takes little time off in a return to action – Lumen

August 17, 2023October 17, 2025 CTI

Lumen Black Lotus Labs observed a renewed HiatusRAT campaign (mid‑June–August 2023) in which the actor recompiled binaries for multiple CPU architectures and hosted payloads on shifting VPS infrastructure. Telemetry linked the campaign to heavy targeting of Ta…

Read More
Threat Research

Chinese Entanglement | DLL Hijacking in the Asian Gambling Sector

August 17, 2023October 13, 2025 SentinelOne

Threat actors abuse Adobe Creative Cloud, Edge, and other executables vulnerable to DLL hijacking in campaign targeting the Southeast Asian gambling sector.

Read More
Threat Research

Raccoon Stealer Resurfaces with New Enhancements – SOCRadarĀ® Cyber Intelligence Inc.

August 17, 2023October 15, 2025 Securonix

Raccoon Stealer has resurfaced on hacker forums with version 2.3.0 (2.3.0.1 since Aug 15, 2023), promoting new features and improvements. The update emphasizes faster search for cookies and credentials, automated bot blocking in the admin panel, and expanded d…

Read More
Threat Research

XWorm: Technical Analysis of a New Malware VersionĀ 

August 17, 2023October 14, 2025 Securonix

This article provides a detailed look at a new XWorm variant, covering its persistence, anti-analysis techniques, and data-exfiltration methods, including how it retrieves and decrypts configuration. It also demonstrates how ANY.RUN is used to uncover the malw…

Read More
Threat Research

From Conti to Akira | Decoding the Latest Linux & ESXi Ransomware Families

August 16, 2023October 14, 2025 Securonix

This article examines how ransomware families targeting Linux and VMware ESXi have evolved, often reusing Conti, Babuk, and LockBit code to achieve cross-platform parity and rapid deployment. It highlights several Linux/ESXi payloads (MONTI Locker, Akira, Trig…

Read More
Threat Research

Malvertisers up their game against researchers

August 16, 2023October 15, 2025 Securonix

Threat actors continue to refine malvertising campaigns with cloaking and fingerprinting to stay under defenders’ radars while delivering infostealers and other malware used by initial access brokers in ransomware operations. The article documents a recent mal…

Read More
Threat Research

Scarabs colon-izing vulnerable servers

August 16, 2023October 14, 2025 Securonix

Spacecolon is a Delphi-based toolset used by CosmicBeetle to deploy Scarab ransomware and provide backdoor access to compromised servers. The operators are active globally, rely on vulnerable web servers or RDP brute-forcing for initial access, and are develop…

Read More
Threat Research

XLoader’s Latest Trick | New macOS Variant Disguised as Signed OfficeNote App

August 16, 2023October 15, 2025 Securonix

XLoader has returned on macOS as a native C/Objective-C variant masquerading as OfficeNote and signed with an Apple developer signature to bypass trust. It drops a payload, establishes persistence via a Launch Agent, exfiltrates browser and clipboard data, and…

Read More
Threat Research

Analysis of APT Attack Cases Targeting Web Services of Korean Corporations – ASEC BLOG

August 16, 2023October 20, 2025 Securonix

Two sentences summarizing the article: ASEC documents repeated APT-style attacks on vulnerable Korean web servers (IIS, Tomcat, JBoss, Nginx) with web shells, privilege escalation, and credential theft, suggesting possible ransomware objectives beyond ad fraud…

Read More
Threat Research

Unmasking – EVLF DEV-The Creator of CypherRAT and CraxsRAT – CYFIRMA

August 15, 2023October 13, 2025 Securonix

CYFIRMA researchers uncover EVLF DEV, a MaaS operator behind CypherRAT and CraxsRAT, whose Android RATs have been licensed to over 100 buyers under a lifetime license. The report shows how these tools enable real-time remote control of victims’ devices, includ…

Read More
Threat Research

Carderbee: APT Group use Legit Software in Supply Chain Attack Targeting Orgs in Hong Kong

August 15, 2023October 14, 2025 Securonix

Symantec researchers describe Carderbee, a newly named APT group that used the Cobra DocGuard software in a supply chain attack to deploy the Korplug backdoor (PlugX) onto victim machines, primarily in Hong Kong. The operation relies on legitimate software and…

Read More

Posts pagination

Previous 1 … 387 388 389 … 491 Next

What are you looking for ?

  • šŸ–„ļø [ D A S H B O A R D ]
  • šŸ•µļøā€ā™‚ļø Threat Research
  • šŸ“° Security News
  • 🚨 Attack & Data Breach
  • šŸ›‘ Ransomware Monitor
  • šŸ’€ Hacked! Web Defacement
  • ✨ Interesting Stuff
  • šŸ“ŗ Youtube Overview
  • šŸ” Google Cybersecurity
  • šŸ“¢ Telegram Notification
  • šŸ“° News Daily Recap
  • šŸ“° Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.