Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Chinese Threat Actors Targeting Europe in SmugX Campaign – Check Point Research

June 30, 2023October 18, 2025 Securonix

Check Point Research tracks a Chinese threat actor targeting European government ministries and embassies, using HTML Smuggling to deploy a PlugX variant across Eastern Europe. The SmugX operation overlaps with RedDelta and Mustang Panda, employs two infection…

Read More
Threat Research

Neo_Net | The Kingpin of Spanish eCrime

June 30, 2023October 14, 2025 Securonix

Neo_Net runs a global eCrime campaign targeting thousands of bank clients, focusing on Spanish and Chilean banks, from June 2021 to April 2023. The operation includes Ankarex Smishing-as-a-Service, phishing panels, and Android trojans to exfiltrate data via Te…

Read More
Threat Research

Charming Kitten Updates POWERSTAR with an InterPlanetary Twist

June 28, 2023October 17, 2025 Volexity

Volexity analyzed a new POWERSTAR backdoor variant used by Charming Kitten that loads most of its functionality in memory and retrieves decryption and configuration components from remote cloud and IPFS-hosted files. The malware uses staged PowerShell loaders,…

Read More
Threat Research

Following NoName057(16) DDoSia Project’s Targets

June 28, 2023October 19, 2025 Securonix

Researchers describe the DDoSia project, a DDoS toolkit used by the NoName057(16) hacktivist group against countries critical of Russia, detailing how targets are chosen, decrypted, and attacked. The analysis covers Telegram-based distribution, an AES-GCM encr…

Read More
Threat Research

Cyble – Multiple New Clipper Malware Variants Discovered In The Wild

June 28, 2023October 16, 2025 Securonix

Clipper malware variants Atlas Clipper, Keyzetsu Clipper, and KWN Clipper target cryptocurrency users by hijacking clipboard wallet addresses to divert transactions to attacker wallets. The variants use Telegram-based C2, mutex-based persistence, and several a…

Read More
Threat Research

White Snake Menace: The Growing Threat of Information Stealers in the Cybercrime Landscape

June 27, 2023October 15, 2025 Securonix

White Snake Stealer is an evolving information-stealer threat first highlighted in 2023, targeting browsers, crypto wallets, email clients, VPNs, and other applications to steal credentials and sensitive data. The article reviews the updated White Snake Steale…

Read More
Threat Research

The DPRK strikes using a new variant of RUSTBUCKET — Elastic Security Labs

June 27, 2023October 18, 2025 Securonix

Elastic Security Labs has detected a new variant of the RustBucket malware targeting macOS, with added persistence and signature-reduction tactics in active development. The REF9135 operations attributed to the Lazarus Group (DPRK) show shifting infrastructure…

Read More
Threat Research

Fresh Phish: Malicious QR Codes Are Quickly Retrieving Employee Credentials

June 27, 2023October 17, 2025 Securonix

QR codes are being exploited in rapid-fire phishing campaigns to harvest employee credentials, often via image-based emails that impersonate trusted brands. INKY reports hundreds of such QR code phishing emails across multiple industries, using tactics like Mi…

Read More
Threat Research

Investigator, API Yourself: Deploying Microsoft Graph on the trail of an attacker

June 27, 2023October 15, 2025 Securonix

Sophos X-Ops MDR investigated two Microsoft 365 incidents where attackers used Microsoft Graph to compromise email accounts, manipulate permissions, and monitor activity. The linked activity across cases suggests a single actor or closely related group targeti…

Read More
Threat Research

Decrypted: Akira Ransomware – Avast Threat Labs

June 27, 2023October 15, 2025 Securonix

Avast researchers developed and released a decryptor for the Akira ransomware and outline how Akira encrypts files, generates keys, and drops ransom notes. The article also notes similarities to Conti and explains how to use the Avast decryptor on Windows (and…

Read More
Threat Research

An Overview of the Different Versions of the Trigona Ransomware

June 26, 2023October 15, 2025 TrendMicro

Trigona is a rapidly evolving ransomware family that began activity in 2022 and has multiple Windows and Linux variants that encrypt files using AES and append the ._locked extension. Operators gain access via ManageEngine CVE-2021-40539, MSSQL brute-force and…

Read More
Threat Research

Crysis Threat Actor Installing Venus Ransomware Through RDP – ASEC BLOG

June 26, 2023October 14, 2025 Securonix

ASEC reports that the Crysis threat actor is deploying Venus ransomware in attacks, using RDP to access externally exposed systems and then dropping multiple malware strains. The operation leverages NirSoft tools and Mimikatz for credential access, conducts ne…

Read More
Threat Research

PSA: Unpatched Critical Privilege Escalation Vulnerability in Ultimate Member Plugin Being Actively Exploited

June 26, 2023October 20, 2025 Securonix

Wordfence warns of a critical, unpatched privilege-escalation vulnerability in the Ultimate Member WordPress plugin (versions up to 2.6.6) that is actively being exploited on sites running the plugin. The advisory provides a firewall rule, remediation guidance…

Read More
Threat Research

Unmasking Meduza Stealer Malware: Comprehensive Analysis & Countermeasures

June 24, 2023October 16, 2025 Securonix

Meduza Stealer is a Windows-targeted data thief designed to exfiltrate browser data, wallet extensions, and other sensitive artifacts while using country exclusions and a server check to stay stealthy. Uptycs analyzes its marketing, distribution, workflow, and…

Read More
Threat Research

PhonyC2: Revealing a New Malicious Command & Control Framework by MuddyWater | Deep Instinct

June 24, 2023October 16, 2025 Securonix

Deep Instinct researchers uncovered PhonyC2, a custom, continuously evolving C2 framework used by MuddyWater since 2021, including in an attack on the Technion and ongoing PaperCut exploitation. The analysis details the framework’s code, infection flow, persis…

Read More

Posts pagination

Previous 1 … 398 399 400 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.