Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Inside the IcedID BackConnect Protocol (Part 2)

July 28, 2023October 15, 2025 CTI

Introduction In this blog post, we will provide an update on our continued analysis and tracking of infrastructure associated with…

Read More
Threat Research

MAR-10454006-r1.v2 SUBMARINE Backdoor | CISA

July 28, 2023October 16, 2025 CISA

CISA analyzed seven samples of a novel Barracuda Email Security Gateway backdoor named SUBMARINE that persists in the appliance SQL database and preloads a shared object into the BSMTP daemon to execute commands with root privileges. The intrusion uses a malic…

Read More
Threat Research

MAR-10454006-r2.v1 SEASPY Backdoor | CISA

July 28, 2023October 13, 2025 CISA

CISA analyzed two SEASPY ELF samples that target vulnerable Barracuda Email Security Gateway appliances (CVE-2023-2868) and persist as a fake “BarracudaMailService”. The backdoor uses libpcap to sniff SMTP traffic for a magic string and, on match, opens a TCP …

Read More
Threat Research

MAR-10454006-r3.v1 Exploit Payload Backdoor | CISA

July 28, 2023October 14, 2025 CISA

CISA analyzed 14 samples of Barracuda exploit payloads that leverage CVE-2023-2868 to perform command injection and install Base64-encoded reverse shells on affected Barracuda Email Security Gateway appliances. The reverse shells create OpenSSL-based encrypted…

Read More
Threat Research

Related CherryBlos and FakeTrade Android Malware Involved in Scam Campaigns

July 28, 2023October 13, 2025 TrendMicro

Trend Micro discovered two related Android malware families—CherryBlos and FakeTrade—used in cryptocurrency-mining and financial scam campaigns that distribute malicious APKs via fake social posts and phishing websites. CherryBlos abuses Android Accessibility …

Read More
Threat Research

RedLine | Malware Trends Tracker

July 28, 2023October 14, 2025 Securonix

RedLine Stealer is an information-stealing malware that harvests credentials and other sensitive data from browsers and apps, and it can deliver other malicious programs like ransomware, RATs, trojans, and miners. It leverages social engineering to spread via …

Read More
Threat Research

New Rilide Stealer Version Targets Banking Data and Works Around Google Chrome Manifest V3

July 28, 2023October 14, 2025 Securonix

Trustwave SpiderLabs details a new version of the Rilide Stealer for Chromium-based browsers that adapts to Chrome Manifest V3, featuring modular code and data exfiltration to Telegram as well as interval-based screenshots. The report covers multiple campaigns…

Read More
Threat Research

Reptile Malware Targeting Linux Systems – ASEC BLOG

July 28, 2023October 16, 2025 Securonix

Reptile is an open-source Linux kernel rootkit that conceals files, processes, and network traffic, and adds a reverse shell with a port-knocking trigger for C&C communication. It has been observed in Korea-targeted attacks and shows similarities to Syslogk an…

Read More
Threat Research

Sliver C2 Being Distributed Through Korean Program Development Company – ASEC BLOG

July 28, 2023October 14, 2025 Securonix

AhnLab ASEC highlights a campaign where malware installers masquerade as legitimate Korean VPN and software download files, distributing Sliver C2 and MeshAgent through a dedicated program developer’s ecosystem. The operators use Go-based malware, anti-sandbox…

Read More
Threat Research

Honeypot Recon: New Variant of SkidMap Targeting Redis

July 27, 2023October 14, 2025 Securonix

A new and more dangerous variant of SkidMap was observed targeting unsecured Redis NO AUTH instances, featuring dual Linux infection paths (Debian/Ubuntu and RedHat/CentOS) and a sophisticated multi-stage payload chain including dropper delivery, backdoor inst…

Read More
Threat Research

Threat Actors Exploiting Ivanti EPMM Vulnerabilities | CISA

July 27, 2023October 14, 2025 Securonix

Two sentences summarizing the content: The article references a CISA advisory about threat actors exploiting Ivanti EPMM vulnerabilities. It notes the presence of IOCs (file hashes) associated with the activity and suggests mitigation guidance from CISA. Hasht…

Read More
Threat Research

Report: Ransomware Command-and-Control Providers Unmasked by Halcyon Researchers

July 27, 2023October 17, 2025 Securonix

Halcyon researchers expose Command-and-Control Providers (C2Ps) as a key pillar of the ransomware economy, offering services to attackers while presenting themselves as legitimate businesses. The report links Cloudzy as a common service provider used by actors…

Read More
Threat Research

Cado Security Labs Encounter Novel Malware, Redis P2Pinfect

July 27, 2023October 13, 2025 Securonix

Cado Security Labs describe P2Pinfect, a Rust-based botnet targeting publicly-accessible Redis deployments with cross‑platform Linux and Windows payloads. The malware propagates via Redis replication and module loading, then uses a peer‑to‑peer C2 network, def…

Read More
Threat Research

Unpacking the Threats Within: The Hidden Dangers of .zip Domains – Avast Threat Labs

July 27, 2023October 18, 2025 Securonix

Avast Threat Labs examines how the newly popular .zip top-level domain is being abused to mislead users into thinking they are downloading files, with many examples mimicking major brands like Microsoft, Google, and Amazon. The piece also details how attackers…

Read More
Threat Research

Sneaky XWorm Uses MultiStaged Attack – Cyble

July 27, 2023October 16, 2025 Securonix

Two sentences: Cyber threat actors use multistage attacks and LOLBins to evade detection while delivering XWorm via WebDAV-enabled infrastructure, with BATLoader and VBScript stages helping drop and execute payloads. The campaign centers on XWorm’s versatility…

Read More

Posts pagination

Previous 1 … 392 393 394 … 491 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.