Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Hunting for A New Stealthy Universal Rootkit Loader

July 6, 2023October 17, 2025 Securonix

A Trend Micro analysis uncovers a new signed rootkit loader cluster that acts as a universal kernel-driver loader, enabling second-stage unsigned modules to be loaded in the target system. The activity is linked to a China-based actor (associated with FiveSys)…

Read More
Threat Research

A Technical Analysis of WhiteSnake Stealer

July 5, 2023October 16, 2025 admin

WhiteSnake Stealer is a .NET stealer that builds configurable payloads (EXE, VBS, CMD, MSI, PY, DOCM, HTA, etc.), decodes embedded Base64 blobs (often via certutil), runs from %TEMP%, collects browser/crypto wallet/app data, encrypts exfiltrated logs with RC4 …

Read More
Threat Research

Analysis of the Rekoobe Backdoor Being Used In Attacks Against Linux Systems in Korea – ASEC BLOG

July 5, 2023October 17, 2025 Securonix

Rekoobe is a Linux backdoor used by the APT31 group that communicates with a C2 server to download, upload, and execute commands, including a reverse shell, with multiple variants observed in Korea. It uses encryption to protect C2 traffic (AES-128 via an HMAC…

Read More
Threat Research

Malicious Batch File (*.bat) Disguised as a Document Viewer Being Distributed (Kimsuky) – ASEC BLOG

July 5, 2023October 18, 2025 Securonix

A batch-file malware campaign disguises itself as document viewers (Word/HWP) and uses email distribution to download scripts tailored to the target’s anti-malware software. The operation is attributed to the Kimsuky group, leveraging Google Drive/Docs, regist…

Read More
Threat Research

Distribution of NetSupport Malware Using Email – ASEC BLOG

July 5, 2023October 14, 2025 Securonix

AhnLab’s ASEC reports NetSupport RAT distributed via spear phishing emails and phishing pages disguised as invoices, shipment documents, and purchase orders. The campaign uses a malicious JavaScript in a ZIP attachment that, once executed, downloads and runs a…

Read More
Threat Research

The five-day job: A BlackByte ransomware intrusion case study | Microsoft Security Blog

July 4, 2023October 15, 2025 Securonix

Microsoft IR documents a five-day intrusion where BlackByte 2.0 ransomware operators moved from initial access to impact using a mix of exploits, living-off-the-land techniques, and custom tooling. Key actions included ProxyShell exploitation of Exchange, web …

Read More
Threat Research

Malicious ad for USPS fishes for banking credentials

July 4, 2023October 13, 2025 Securonix

Malvertising is used to carry out phishing by impersonating brands in search ads, targeting USPS package trackers. The campaign collects addresses, credit card details, and banking credentials through a dynamic phishing site. #USPS #JPMorganChase #Google #Clou…

Read More
Threat Research

unknown actor using APT29’s TTP against Chinese users

July 3, 2023October 17, 2025 Securonix

Lab52 detects a maldoc-based campaign targeting Chinese-speaking users, delivered via Chinese phishing and designed around a resume decoy. While the infection chain shares some traits with APT29, it features significant differences (Chinese-language decoy, pro…

Read More
Threat Research

Cyble – ARCrypt Ransomware Evolves With Multiple TOR Communication Channels

July 3, 2023October 13, 2025 Securonix

ARCrypter ransomware, also known as ARCrypt, has evolved since 2022 to target Windows and Linux and now uses a Go-based Linux variant. Threat actors rely on victim-specific Tor mirror sites and TOX messaging, while favoring Monero for payments to preserve anon…

Read More
Threat Research

Malvertising Used as Entry Vector for BlackCat Actors Also Leverage SpyBoy Terminator

July 2, 2023October 16, 2025 TrendMicro

Trend Micro investigated a malvertising campaign that lured users to a cloned WinSCP download page which delivered an ISO that deployed a trojanized Python environment and Cobalt Strike beacons, enabling AD discovery, credential theft, persistence, and lateral…

Read More
Threat Research

Cyble – Underground Team Ransomware Demands Nearly $3 Million

July 2, 2023October 15, 2025 Securonix

CRIL (Cyble Research and Intelligence Labs) reports the emergence of Underground Team Ransomware, a new strain that tailors ransom notes to victims and offers additional services such as vulnerability insights and data recovery guidance. The article details it…

Read More
Threat Research

Welcome to New York: Exploring TA453’s Foray into LNKs and Mac Malware | Proofpoint US

July 2, 2023October 13, 2025 Securonix

TA453 (Charming Kitten) expands its espionage toolkit with new file types and cross‑platform Mac malware, deploying LNK infection chains and a PowerShell backdoor named GorjolEcho. Proofpoint and partners disrupted the operation, but TA453 continues targeting …

Read More
Threat Research

Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks

July 2, 2023October 17, 2025 Securonix

ReversingLabs’ researchers uncovered more than a dozen malicious npm packages used to power a dual-use campaign that blends phishing against Microsoft 365 users with software supply chain manipulation. Dubbed Operation Brainleeches, the campaign features two d…

Read More
Threat Research

Threat Alert: Anatomy of Silentbob’s Cloud Attack

July 1, 2023October 16, 2025 Aquasec

Cloud‑native attackers are building a worm‑like campaign targeting exposed JupyterLab and Docker APIs, deploying Tsunami malware, cryptomining, and a backdoor while concealing infrastructure with proxies and DNS‑over‑HTTPS. Researchers attribute the activity t…

Read More
Threat Research

Goot to Loot—How a Gootloader Infection Led to Credential Access – ReliaQuest

July 1, 2023October 15, 2025 Reliaquest

ReliaQuest’s Threat Hunting Team traced a May 2023 incident to Gootloader, a JavaScript-based initial-access malware that can seed second-stage remote access tools and enable ransomware deployments. The assessment details Gootloader’s infection chain, the Syst…

Read More

Posts pagination

Previous 1 … 397 398 399 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.