Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Dark Utilities Platform Provides C2 Server for Threat Actors – SOCRadar® Cyber Intelligence Inc.

August 8, 2023October 16, 2025 Securonix

Dark Utilities is a Dark Utilities platform that acts as a C2-as-a-Service, enabling threat actors to establish C2, remote access, and other malicious capabilities without building their own infrastructure. It also supports DDoS, cryptomining, and cross-OS pay…

Read More
Threat Research

Visualizing Qakbot Infrastructure Part II: Uncharted Territory

August 7, 2023October 14, 2025 CTI

A Data-Driven Approach Based on Analysis of Network Telemetry In this blog post, we will provide an update on our high-level analysis of…

Read More
Threat Research

Comrades in Arms? | North Korea Compromises Sanctioned Russian Missile Engineering Company

August 7, 2023October 16, 2025 SentinelOne

North Korean threat actors attempt to further missile program by compromising sanctioned Russian defense company with OpenCarrot backdoor.

Read More
Threat Research

German Embassy Lure: Likely Part of Campaign Against NATO Aligned Ministries of Foreign Affairs

August 7, 2023October 19, 2025 Securonix

EclecticIQ analyzes a campaign targeting NATO-aligned ministries of foreign affairs, where PDFs impersonating the German embassy deliver a Duke malware variant via HTML smuggling and DLL sideloading, with Zulip used as a covert C2 channel. This operation is at…

Read More
Threat Research

Attackers Distribute Malware via Freeze.rs And SYK Crypter | FortiGuard Labs

August 7, 2023October 13, 2025 Securonix

FortiGuard Labs identified a Rust injector chain that loads XWorm and Remcos via SYK Crypter, delivered through a phishing workflow starting with a malicious PDF. The operation leverages the Red Team tool Freeze.rs, Base64/LZMA encoding, and PowerShell to bypa…

Read More
Threat Research

Common TTPs of attacks against industrial organizations. Implants for uploading data | Kaspersky ICS CERT

August 7, 2023October 16, 2025 Securonix

This report analyzes a multi-stage implant operation targeting industrial organizations in Eastern Europe, focusing on persistent access, data gathering (including from air-gapped systems), and data exfiltration via cloud services. It details a three-layer imp…

Read More
Threat Research

Cyble – STRRAT’s Latest Version Incorporates Dual Obfuscation Layers

August 7, 2023October 14, 2025 Securonix

Two sentences summarizing the content: Cyble analyzes STRRAT version 1.6, which is distributed via a spam email containing a PDF that leads to a ZIP-delivered JavaScript dropper installing STRRAT. The variant adds dual string obfuscation (Zelix KlassMaster and…

Read More
Threat Research

LOLKEK Unmasked | An In-Depth Analysis of New Samples and Evolving Tactics

August 7, 2023October 16, 2025 Securonix

SentinelOne MDR observed new LOLKEK (GlobeImposter) samples in May 2023 with updated capabilities, including local drive discovery and encryption, as well as a TOR-based victim portal. The article reviews IoCs, ransom-note details, victim-portal workflows, and…

Read More
Threat Research

Falcon Complete: Zero-Day Exploit Case Study | CrowdStrike

August 5, 2023October 18, 2025 Securonix

CrowdStrike Falcon Complete observed a still-unknown zero-day vulnerability affecting Windows Error Reporting (WER) that was exploited in the wild and later disclosed as CVE-2023-36874. The write-up details how the vulnerability was discovered, the exploit cha…

Read More
Threat Research

Invisible Adware: Unveiling Ad Fraud Targeting Android Users | McAfee Blog

August 4, 2023October 16, 2025 McAfee

Authored by SangRyol Ryu, McAfee Threat Researcher We live in a world where advertisements are everywhere, and it’s no surprise…
The post Invisible Adware: Unveiling Ad Fraud Targeting Android Users appeared first on McAfee Blog….

Read More
Threat Research

Focus on DroxiDat/SystemBC

August 4, 2023October 16, 2025 Securonix

DroxiDat is a compact variant of the SystemBC backdoor used with Cobalt Strike beacons against a southern African electric utility, illustrating how MaaS-style toolsets enable stealthy reconnaissance and potential ransomware deployment. The report links this a…

Read More
Threat Research

V3 Detects and Blocks Magniber Ransomware Injection (Direct Syscall Detection) – ASEC BLOG

August 4, 2023October 23, 2025 Securonix

Magniber continues to spread at high volumes by masquerading as Windows security updates and injecting into running processes to encrypt files. It then establishes persistence via the Task Scheduler and deletes volume shadow copies to hinder recovery, while le…

Read More
Threat Research

EvilProxy Phishing Used for Cloud Account Takeover Campaign | Proofpoint US

August 4, 2023October 13, 2025 Securonix

Proofpoint researchers report a dramatic rise in cloud account takeovers targeting executives worldwide, with over 100 organizations affected and about 1.5 million employees impacted. The campaigns hinge on EvilProxy, a reverse-proxy phishing toolkit that can …

Read More
Threat Research

Cyble – Utilization Of Leaked Ransomware Builders In Tech-Related Scams

August 4, 2023October 16, 2025 Securonix

Cyble researchers describe a Tech Scam that leverages leaked ransomware builders to distribute a multi-stage downloader and multiple ransomware payloads as part of fraud campaigns. The operation ties phishing, typosquatting, and Dark Web activity to fake antiv…

Read More
Threat Research

Kubernetes Exposed: One Yaml away from Disaster

August 4, 2023October 15, 2025 Aquasec

Exposed Kubernetes API servers and risky misconfigurations enable attackers to access secrets and take control over clusters, with campaigns actively mining cryptocurrency and backdoors deployed across exposed environments. The piece analyzes how anonymous acc…

Read More

Posts pagination

Previous 1 … 390 391 392 … 491 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.